An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate privileges and run arbitrary commands as the root user. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 15.1X53 prior to 15.1X53-D47, 15.1 prior to 15.1R3. Junos versions prior to 15.1 are not affected. No other Juniper Networks products or platforms are affected by this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-2250 An XML injection vulnerability in Junos OS CLI can allow a locally authenticated user to elevate privileges and run arbitrary commands as the root user. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS 15.1X53 prior to 15.1X53-D47, 15.1 prior to 15.1R3. Junos versions prior to 15.1 are not affected. No other Juniper Networks products or platforms are affected by this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

There is no direct workaround to completely eliminate the risk of this vulnerability. Use access lists or firewall filters to limit access to the router's CLI only from trusted hosts. Restrict access to the CLI to only highly trusted administrators.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T19:36:28.432Z

Reserved: 2017-06-28T00:00:00

Link: CVE-2017-10603

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-07-17T13:18:18.687

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-10603

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.