An Improper Privilege Management vulnerability in a shell session of Juniper Networks Junos OS allows an authenticated unprivileged attacker to gain full control of the system. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D45 on SRX Series; 12.3X48 versions prior to 12.3X48-D20 on SRX Series; 12.3 versions prior to 12.3R11 on EX Series; 14.1X53 versions prior to 14.1X53-D30 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100;; 15.1X49 versions prior to 15.1X49-D20 on SRX Series.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA10857 | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/104718 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041314 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2018-07-11 11:29
Updated : 2019-10-09 16:31
NVD link : CVE-2018-0024
Mitre link : CVE-2018-0024
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
juniper
- srx210
- ex3200
- srx1500
- srx3600
- srx4100
- ex4300
- ex8200\/vc_\(xre\)
- ex3300\/vc
- qfx5100
- ex6200
- ex4550\/vc
- qfx3500
- ex3400
- ex4200
- srx650
- ex2300
- srx550
- srx300
- srx4200
- ex_rps
- ex2200\/vc
- srx340
- ex2300-c
- srx5600
- ex4550
- srx5800
- ex3300
- srx5400
- junos
- srx240
- srx110
- srx3400
- srx320
- ex2200-c
- ex9200
- srx1400
- srx100
- ex4600
- srx345
- ex2200
- qfx3600
- srx220