An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue affects Juniper Networks Junos OS Evolved 21.4 version 21.4R1-EVO and later versions prior to 22.1R1-EVO.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32601 An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue affects Juniper Networks Junos OS Evolved 21.4 version 21.4R1-EVO and later versions prior to 22.1R1-EVO.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: 22.2R1-EVO, 22.3R1-EVO, and all subsequent releases.


Workaround

To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted administrative networks, hosts and users.

References
History

Wed, 05 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2025-02-05T21:37:46.448Z

Reserved: 2023-03-29T00:00:00.000Z

Link: CVE-2023-28983

cve-icon Vulnrichment

Updated: 2024-08-02T13:51:39.128Z

cve-icon NVD

Status : Modified

Published: 2023-04-17T22:15:09.810

Modified: 2024-11-21T07:56:20.360

Link: CVE-2023-28983

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.