First published: Fri Oct 11 2024(Updated: )
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of protected files on the file system. Through the execution of crafted CLI commands, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system. This issue affects Junos OS on SRX Series: * All versions before 21.4R3-S8, * 22.2 before 22.2R3-S5, * 22.3 before 22.3R3-S4, * 22.4 before 22.4R3-S4, * 23.2 before 23.2R2-S2, * 23.4 before 23.4R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.4R3-S8<22.2R3-S5<22.3R3-S4<22.4R3-S4<23.2R2-S2<23.4R2 |
The following software releases have been updated to resolve this specific issue: 21.4R3-S8, 22.2R3-S5*, 22.3R3-S4*, 22.4R3-S4, 23.2R2-S2, 23.4R2, 24.2R1, and all subsequent releases. *Future release
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39527 is classified as a medium severity vulnerability due to the potential exposure of sensitive information by low-privileged users.
To fix CVE-2024-39527, you should upgrade your Junos OS to a patched version that addresses this vulnerability.
CVE-2024-39527 affects low-privileged local users of Juniper Networks Junos OS on SRX Series devices.
The affected versions for CVE-2024-39527 include Junos OS versions up to 21.4R3-S8, 22.2R3-S5, 22.3R3-S4, 22.4R3-S4, 23.2R2-S2, and 23.4R2.
Due to CVE-2024-39527, unauthorized low-privileged users can view the contents of protected files within the Junos OS file system.