Home

Description

An Incorrect Default Permissions vulnerability in the command line interface (CLI) of Juniper Networks Junos OS Evolved allows a low privileged local attacker to view NETCONF traceoptions files, representing an exposure of sensitive information. On all Junos OS Evolved platforms, when NETCONF traceoptions are configured, NETCONF traceoptions files get created with an incorrect group permission, which allows a low-privileged user can access sensitive information compromising the confidentiality of the system. Junos OS Evolved:  * All versions before 20.4R3-S9-EVO,  * 21.2-EVO before 21.2R3-S7-EVO,  * 21.4-EVO before 21.4R3-S5-EVO,  * 22.1-EVO before 22.1R3-S5-EVO,  * 22.2-EVO before 22.2R3-S3-EVO,  * 22.3-EVO before 22.3R3-EVO, 22.3R3-S2-EVO,  * 22.4-EVO before 22.4R3-EVO,  * 23.2-EVO before 23.2R1-S2-EVO, 23.2R2-EVO.

PUBLISHED Reserved 2024-06-25 | Published 2024-10-11 | Updated 2024-10-11 | Assigner juniper




MEDIUM: 5.0CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

MEDIUM: 5.1CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-276 Incorrect Default Permissions

Product status

Default status
unaffected

Any version before 20.4R3-S9-EVO
affected

21.2-EVO (semver) before 21.2R3-S7-EVO
affected

21.4-EVO (semver) before 21.4R3-S5-EVO
affected

22.1-EVO (semver) before 22.1R3-S5-EVO
affected

22.2-EVO (semver) before 22.2R3-S3-EVO
affected

22.3-EVO (semver) before 22.3R3-S2-EVO
affected

22.4-EVO (semver) before 22.4R3-EVO
affected

23.2-EVO (semver) before 23.2R1-S2-EVO, 23.2R2-EVO
affected

References

supportportal.juniper.net/JSA88106 vendor-advisory

cve.org (CVE-2024-39544)

nvd.nist.gov (CVE-2024-39544)

Download JSON