First published: Thu Jul 11 2024(Updated: )
An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information. When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information. This issue affects: Junos OS: * All versions before 21.2R3-S9; * 21.4 versions before 21.4R3-S9; * 22.2 versions before 22.2R2-S1, 22.2R3; * 22.3 versions before 22.3R1-S1, 22.3R2; Junos OS Evolved: * All versions before before 22.1R3-EVO; * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO; * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.2R3-S9<21.4R3-S9<22.2R2-S1<22.2R3<22.3R1-S1<22.3R2 | |
Juniper Networks Junos OS | <22.1R3-EVO<22.2R2-S1-EVO<22.2R3-EVO<22.3R1-S1-EVO<22.3R2-EVO |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-39532 is classified as high due to the potential for local, authenticated attackers to access sensitive information.
To fix CVE-2024-39532, update to the latest patched version of Junos OS or Junos OS Evolved as recommended by Juniper Networks.
CVE-2024-39532 affects users of Juniper Networks Junos OS and Junos OS Evolved running specific vulnerable versions.
CVE-2024-39532 can expose sensitive operational information logged during specific user actions.
No, CVE-2024-39532 requires local access and high privileges to exploit, preventing remote exploitation.