8.5
CWE
78
Advisory Published
Updated

CVE-2024-39522: Junos OS Evolved: CLI parameter processing issue allows privilege escalation

First published: Thu Jul 11 2024(Updated: )

An Improper Neutralization of Special Elements vulnerability in Juniper Networks Junos OS Evolved commands allows a local, authenticated attacker with low privileges to escalate their privileges to 'root' leading to a full compromise of the system. The Junos OS Evolved CLI doesn't properly handle command options in some cases, allowing users which execute specific CLI commands with a crafted set of parameters to escalate their privileges to root on shell level. This issue affects Junos OS Evolved: * 22.3-EVO versions before 22.3R2-EVO, * 22.4-EVO versions before 22.4R1-S1-EVO, 22.4R2-EVO.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=22.3
Junos OS Evolved=22.3-r1
Junos OS Evolved=22.3-r1-s1
Junos OS Evolved=22.3-r1-s2
Junos OS Evolved=22.4
Junos OS Evolved=22.4-r1

Remedy

The following software releases have been updated to resolve this specific issue: 22.3R2-EVO, 22.4R1-S1-EVO, 22.4R2-EVO, 23.2R1-EVO, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-39522?

    CVE-2024-39522 is classified as a high severity vulnerability due to its potential for privilege escalation and full system compromise.

  • How do I fix CVE-2024-39522?

    To fix CVE-2024-39522, upgrade Junos OS Evolved to a version that has addressed the vulnerability as specified in vendor advisories.

  • What is the impact of CVE-2024-39522 on affected systems?

    The impact of CVE-2024-39522 allows local, authenticated attackers with low privileges to escalate their access to root level, resulting in full system compromise.

  • Which versions of Junos OS Evolved are affected by CVE-2024-39522?

    Versions 22.3, 22.3-r1, 22.3-r1-s1, 22.3-r1-s2, and 22.4, including their major revisions, are affected by CVE-2024-39522.

  • Who can exploit CVE-2024-39522?

    CVE-2024-39522 can be exploited by local, authenticated attackers who have low privileges on the Junos OS Evolved systems.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203