On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configured, and a super-user performs specific actions via NETCONF, then a low-privileged user can access sensitive information compromising the confidentiality of the system.
This issue affects:
Junos OS:
* all versions before 21.2R3-S7,
* from 21.4 before 21.4R3-S5,
* from 22.1 before 22.1R3-S5,
* from 22.2 before 22.2R3-S3,
* from 22.3 before 22.3R3-S2,
* from 22.4 before 22.4R3,
* from 23.2 before 23.2R1-S2.
Junos OS Evolved:
* all versions before 21.2R3-S7-EVO,
* from 21.3 before 21.3R3-S5-EVO,
* from 21.4 before 21.4R3-S5-EVO,
* from 22.1 before 22.1R3-S5-EVO,
* from 22.2 before 22.2R3-S3-EVO,
* from 22.3 before 22.3R3-S2-EVO,
* from 22.4 before 22.4R3-EVO,
* from 23.2 before 23.2R1-S2.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19263 | An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to access confidential information on the system. On all Junos OS and Junos OS Evolved platforms, when NETCONF traceoptions are configured, and a super-user performs specific actions via NETCONF, then a low-privileged user can access sensitive information compromising the confidentiality of the system. This issue affects: Junos OS: * all versions before 21.2R3-S7, * from 21.4 before 21.4R3-S5, * from 22.1 before 22.1R3-S5, * from 22.2 before 22.2R3-S3, * from 22.3 before 22.3R3-S2, * from 22.4 before 22.4R3, * from 23.2 before 23.2R1-S2. Junos OS Evolved: * all versions before 21.2R3-S7-EVO, * from 21.3 before 21.3R3-S5-EVO, * from 21.4 before 21.4R3-S5-EVO, * from 22.1 before 22.1R3-S5-EVO, * from 22.2 before 22.2R3-S3-EVO, * from 22.3 before 22.3R3-S2-EVO, * from 22.4 before 22.4R3-EVO, * from 23.2 before 23.2R1-S2. |
Solution
The following software releases have been updated to resolve this specific issue: Junos OS: 21.2R3-S7, 21.4R3-S5, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.4R1 and all subsequent releases. Junos OS Evolved: 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S5-EVO, 22.2R3-S3-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R1-S2-EVO, 23.4R1-EVO and all subsequent releases.
Workaround
To reduce the risk of exploitation, enable access control lists (ACLs) and other filtering mechanisms to limit access to the device only from trusted hosts and networks to the NETCONF service.
Thu, 06 Feb 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos Juniper junos Os Evolved |
|
| CPEs | cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper
Juniper junos Juniper junos Os Evolved |
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-08-01T22:27:35.780Z
Reserved: 2023-12-27T19:38:25.709Z
Link: CVE-2024-21615
Updated: 2024-08-01T22:27:35.780Z
Status : Analyzed
Published: 2024-04-12T15:15:24.153
Modified: 2025-02-06T18:39:32.977
Link: CVE-2024-21615
No data.
OpenCVE Enrichment
No data.
EUVD