A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D80 on SRX Series.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0865 A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D80 on SRX Series.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: Junos OS: 12.3X48-D80 and all subsequent releases.


Workaround

To reduce the risk of exploitation of this vulnerability, customers should limit access to the Junos shell to only trusted administrators and limit their actions to previously reviewed and agreed-upon commands and command arguments as part of a structured change management workflow. Shell commands which are run should be logged and reviewed as part of standard security practices.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T17:49:17.709Z

Reserved: 2018-10-11T00:00:00

Link: CVE-2019-0058

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-09T20:15:16.787

Modified: 2024-11-21T04:16:09.427

Link: CVE-2019-0058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.