No analysis available yet.
Vendor Solution
The following software releases have been updated to resolve this specific issue: 19.1R3-S9, 19.2R1-S9, 19.2R3-S5, 19.4R3-S8, 20.2R3-S4, 20.3R3-S3, 20.4R3-S2, 20.4R3-S3, 21.1R3-S1, 21.2R2-S2, 21.2R3, 21.3R2, 21.3R3, 21.4R1-S1, 21.4R2, 22.1R1, and all subsequent releases.
Vendor Workaround
A workaround would be to deny users access to the "request system download ..." and "show system download ..." CLI commands.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-27368 | An Improper Neutralization of Special Elements vulnerability in the download manager of Juniper Networks Junos OS on SRX Series and EX Series allows a locally authenticated attacker with low privileges to take full control over the device. One aspect of this vulnerability is that the attacker needs to be able to execute any of the "request ..." or "show system download ..." commands. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 19.2R1-S9, 19.2R3-S5; 19.3 versions prior to 19.3R3-S6; 19.4 versions prior to 19.4R3-S8; 20.1 versions prior to 20.1R3-S4; 20.2 versions prior to 20.2R3-S4; 20.3 versions prior to 20.3R3-S3; 20.4 versions prior to 20.4R3-S2, 20.4R3-S3; 21.1 versions prior to 21.1R3-S1; 21.2 versions prior to 21.2R2-S2, 21.2R3; 21.3 versions prior to 21.3R2, 21.3R3; 21.4 versions prior to 21.4R1-S1, 21.4R2. |
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA69725 |
|
No history.
Subscriptions
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T00:15:46.928Z
Reserved: 2021-12-21T00:00:00.000Z
Link: CVE-2022-22221
No data.
Status : Modified
Published: 2022-07-20T15:15:09.123
Modified: 2024-11-21T06:46:25.550
Link: CVE-2022-22221
No data.
OpenCVE Enrichment
No data.
EUVD