First published: Mon Apr 17 2023(Updated: )
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue affects Juniper Networks Junos OS Evolved 21.4 version 21.4R1-EVO and later versions prior to 22.1R1-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Os Evolved | =21.4 | |
Juniper Junos Os Evolved | =21.4-r1 | |
Juniper Junos Os Evolved | =21.4-r1-s1 | |
Juniper Junos Os Evolved | =21.4-r1-s2 | |
Juniper Junos Os Evolved | =21.4-r2 | |
Juniper Junos Os Evolved | =21.4-r2-s1 | |
Juniper Junos Os Evolved | =21.4-r2-s2 | |
Juniper Junos Os Evolved | =21.4-r3 | |
Juniper Junos Os Evolved | =21.4-r3-s1 | |
Juniper Junos Os Evolved | =21.4-r3-s2 | |
Juniper Junos Os Evolved | =21.4-r3-s3 |
The following software releases have been updated to resolve this specific issue: 22.2R1-EVO, 22.3R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-28983 is high.
CVE-2023-28983 affects Juniper Networks Junos OS Evolved version 21.4 and later.
CVE-2023-28983 allows an authenticated, low privileged, network-based attacker to inject shell commands and execute code.
Update Juniper Networks Junos OS Evolved to version 21.4 or later to fix CVE-2023-28983.
You can find more information about CVE-2023-28983 on the Juniper Networks support portal: https://supportportal.juniper.net/JSA70609