First published: Thu Jul 11 2024(Updated: )
An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: * All version before 20.4R3-S6-EVO, * 21.2-EVO versions before 21.2R3-S4-EVO, * 21.4-EVO versions before 21.4R3-S6-EVO, * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO, * 22.3-EVO versions before 22.3R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | <20.4 | |
Junos OS Evolved | =20.4 | |
Junos OS Evolved | =20.4-r1 | |
Junos OS Evolved | =20.4-r1-s1 | |
Junos OS Evolved | =20.4-r1-s2 | |
Junos OS Evolved | =20.4-r2 | |
Junos OS Evolved | =20.4-r2-s1 | |
Junos OS Evolved | =20.4-r2-s2 | |
Junos OS Evolved | =20.4-r2-s3 | |
Junos OS Evolved | =20.4-r3 | |
Junos OS Evolved | =20.4-r3-s1 | |
Junos OS Evolved | =20.4-r3-s2 | |
Junos OS Evolved | =20.4-r3-s3 | |
Junos OS Evolved | =20.4-r3-s4 | |
Junos OS Evolved | =20.4-r3-s5 | |
Junos OS Evolved | =21.2 | |
Junos OS Evolved | =21.2-r1 | |
Junos OS Evolved | =21.2-r1-s1 | |
Junos OS Evolved | =21.2-r1-s2 | |
Junos OS Evolved | =21.2-r2 | |
Junos OS Evolved | =21.2-r2-s1 | |
Junos OS Evolved | =21.2-r2-s2 | |
Junos OS Evolved | =21.2-r3 | |
Junos OS Evolved | =21.2-r3-s1 | |
Junos OS Evolved | =21.2-r3-s2 | |
Junos OS Evolved | =21.2-r3-s3 | |
Junos OS Evolved | =21.2-r3-s4 | |
Junos OS Evolved | =21.4 | |
Junos OS Evolved | =21.4-r1 | |
Junos OS Evolved | =21.4-r1-s1 | |
Junos OS Evolved | =21.4-r1-s2 | |
Junos OS Evolved | =21.4-r2 | |
Junos OS Evolved | =21.4-r2-s1 | |
Junos OS Evolved | =21.4-r2-s2 | |
Junos OS Evolved | =21.4-r3 | |
Junos OS Evolved | =21.4-r3-s1 | |
Junos OS Evolved | =21.4-r3-s2 | |
Junos OS Evolved | =21.4-r3-s3 | |
Junos OS Evolved | =21.4-r3-s4 | |
Junos OS Evolved | =21.4-r3-s5 | |
Junos OS Evolved | =22.2 | |
Junos OS Evolved | =22.2-r1 | |
Junos OS Evolved | =22.2-r1-s1 | |
Junos OS Evolved | =22.2-r2 | |
Junos OS Evolved | =22.3 | |
Junos OS Evolved | =22.3-r1 | |
Junos OS Evolved | =22.3-r1-s1 | |
Junos OS Evolved | =22.3-r1-s2 |
The following software releases have been updated to resolve this specific issue: 20.4R3-S6-EVO, 21.2R3-S4-EVO, 21.4R3-S6-EVO, 22.2R2-S1-EVO, 22.2R3-EVO, 22.3R2-EVO, 22.4R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39520 has a high severity rating due to its potential to allow local authenticated attackers to escalate privileges to root.
To remediate CVE-2024-39520, you should update the Junos OS Evolved to the latest version that is not affected by this vulnerability.
CVE-2024-39520 can be exploited by local, authenticated attackers to conduct privilege escalation on affected systems.
CVE-2024-39520 affects multiple versions of Junos OS Evolved up to version 20.4 and includes certain releases from the 21.x and 22.x versions prior to necessary patches.
There is no documented workaround for CVE-2024-39520; applying the appropriate software update is recommended to mitigate the issue.