An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-27311 An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R2-S2-EVO, 21.2R2-EVO, 21.3R1-EVO and all subsequent releases.


Workaround

To work around the issue, the xinetd service can be restarted manually using one of the commands below: user@device% systemctl restart xinetd or user@device% systemctl restart services-xinetd Additionally, loopback/firewall filters can be applied to disable remote access to the telnet service.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T22:46:51.292Z

Reserved: 2021-12-21T00:00:00

Link: CVE-2022-22164

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-19T01:15:08.787

Modified: 2024-11-21T06:46:17.657

Link: CVE-2022-22164

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.