An Improper Privilege Management vulnerability in the Windows Installer framework used in the Juniper Networks Juniper Identity Management Service (JIMS) allows an unprivileged user to trigger a repair operation. Running a repair operation, in turn, will trigger a number of file operations in the %TEMP% folder of the user triggering the repair. Some of these operations will be performed from a SYSTEM context (started via the Windows Installer service), including the execution of temporary files. An attacker may be able to provide malicious binaries to the Windows Installer, which will be executed with high privilege, leading to a local privilege escalation. This issue affects Juniper Networks Juniper Identity Management Service (JIMS) versions prior to 1.4.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-27334 An Improper Privilege Management vulnerability in the Windows Installer framework used in the Juniper Networks Juniper Identity Management Service (JIMS) allows an unprivileged user to trigger a repair operation. Running a repair operation, in turn, will trigger a number of file operations in the %TEMP% folder of the user triggering the repair. Some of these operations will be performed from a SYSTEM context (started via the Windows Installer service), including the execution of temporary files. An attacker may be able to provide malicious binaries to the Windows Installer, which will be executed with high privilege, leading to a local privilege escalation. This issue affects Juniper Networks Juniper Identity Management Service (JIMS) versions prior to 1.4.0.
Fixes

Solution

The following software releases have been updated to disable the "repair" function of the Windows installer, resolving this specific issue: JIMS 1.4.0, and all subsequent releases.


Workaround

There are no viable workarounds for this issue.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T16:43:45.144Z

Reserved: 2021-12-21T00:00:00

Link: CVE-2022-22187

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-14T16:15:08.047

Modified: 2024-11-21T06:46:21.013

Link: CVE-2022-22187

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.