First published: Fri Oct 11 2024(Updated: )
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This issue affects: Juniper Networks Junos OS Evolved with dual-REs: * All versions before 21.2R3-S8-EVO, * from 21.4-EVO before 21.4R3-S8-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S4-EVO, * from 22.4-EVO before 22.4R3-S3-EVO, * from 23.2-EVO before 23.2R2-S1-EVO, * from 23.4-EVO before 23.4R2-S1-EVO. This issue does not affect Juniper Networks Junos OS.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <21.2R3-S8-EVO>=undefined>=undefined>=undefined>=undefined>=undefined>=undefined |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47495 has been classified as a critical severity vulnerability due to its impact on device control.
To mitigate CVE-2024-47495, update your Junos OS Evolved devices to the latest version recommended by Juniper Networks.
CVE-2024-47495 affects Juniper Networks Junos OS Evolved devices that utilize Dual Routing Engines.
CVE-2024-47495 is an Authorization Bypass Through User-Controlled Key vulnerability.
CVE-2024-47495 requires local authentication and shell access to exploit, making it less likely to be exploited remotely.