Impact
An OS command injection flaw in Juniper Networks Junos OS and Junos OS Evolved allows a local high‑privileged attacker to inject arbitrary shell commands by entering crafted 'set system' CLI commands. This vulnerability, classified as CWE‑78, grants root‑level execution and can lead to complete compromise of the device, impacting confidentiality, integrity, and availability.
Affected Systems
Affected products are Juniper Networks Junos OS and Junos OS Evolved. Vulnerable versions include all releases before 22.4R3‑S8, before 23.2R2‑S5, before 23.4R2‑S7, before 24.2R2‑S2, before 24.4R2, and before 25.2R2 for Junos OS, and the corresponding Evolved series before 22.4R3‑S8‑EVO, before 23.2R2‑S5‑EVO, before 23.4R2‑S7‑EVO, before 24.2R2‑S2‑EVO, before 24.4R2‑EVO, before 25.2R1‑S1‑EVO, and before 25.2R2‑EVO.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity vulnerability. Although the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, the risk remains significant because an attacker with local, high‑privileged access can exploit the flaw by entering crafted CLI commands. Successful exploitation grants unrestricted root command execution, enabling a full system takeover.
OpenCVE Enrichment