First published: Thu Jul 11 2024(Updated: )
A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system. This issue affects Junos OS Evolved: * All versions prior to 21.2R3-S8-EVO, * 21.4 versions prior to 21.4R3-S6-EVO, * 22.1 versions prior to 22.1R3-S5-EVO, * 22.2 versions prior to 22.2R3-S3-EVO, * 22.3 versions prior to 22.3R3-S3-EVO, * 22.4 versions prior to 22.4R3-EVO, * 23.2 versions prior to 23.2R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <21.2R3-S8-EVO<21.4R3-S6-EVO<22.1R3-S5-EVO<22.2R3-S3-EVO<22.3R3-S3-EVO<22.4R3-EVO<23.2R2-EVO |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 21.4R3-S6-EVO, 22.1R3-S5-EVO, 22.2R3-S3-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39546 is considered a high severity vulnerability due to its potential for unauthorized file modification and execution of commands with root privileges.
To fix CVE-2024-39546, update the Junos OS Evolved to a version that addresses this vulnerability as specified in the vendor's advisory.
CVE-2024-39546 affects Junos OS Evolved versions up to and including 23.2R2-EVO.
An authenticated, low-privilege local attacker can exploit CVE-2024-39546 to modify files and execute commands with elevated privileges.
CVE-2024-39546 is a missing authorization vulnerability found in the Socket Intercept command file interface.