An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate privileges and run arbitrary commands as the root user. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 15.1X53 prior to 15.1X53-D47, 15.1 prior to 15.1R3. Junos versions prior to 15.1 are not affected. No other Juniper Networks products or platforms are affected by this issue.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-2250 | An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate privileges and run arbitrary commands as the root user. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 15.1X53 prior to 15.1X53-D47, 15.1 prior to 15.1R3. Junos versions prior to 15.1 are not affected. No other Juniper Networks products or platforms are affected by this issue. |
Fixes
Solution
No solution given by the vendor.
Workaround
There is no direct workaround to completely eliminate the risk of this vulnerability. Use access lists or firewall filters to limit access to the router's CLI only from trusted hosts. Restrict access to the CLI to only highly trusted administrators.
References
History
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T19:36:28.432Z
Reserved: 2017-06-28T00:00:00
Link: CVE-2017-10603
No data.
Status : Deferred
Published: 2017-07-17T13:18:18.687
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-10603
No data.
OpenCVE Enrichment
No data.
EUVD