Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Junos OS Evolved: In a dual-RE scenario a locally authenticated attacker with shell privileges can take over the device.
Vulnerability Description
An Authorization Bypass Through User-Controlled Key vulnerability allows a locally authenticated attacker with shell access to gain full control of the device when Dual Routing Engines (REs) are in use on Juniper Networks Junos OS Evolved devices. This issue affects: Juniper Networks Junos OS Evolved with dual-REs: * All versions before 21.2R3-S8-EVO, * from 21.4-EVO before 21.4R3-S8-EVO, * from 22.2-EVO before 22.2R3-S4-EVO, * from 22.3-EVO before 22.3R3-S4-EVO, * from 22.4-EVO before 22.4R3-S3-EVO, * from 23.2-EVO before 23.2R2-S1-EVO, * from 23.4-EVO before 23.4R2-S1-EVO. This issue does not affect Juniper Networks Junos OS.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
通过用户控制密钥绕过授权机制
Vulnerability Title
Juniper Networks Junos OS Evolved 安全漏洞
Vulnerability Description
Juniper Networks Junos OS Evolved是美国瞻博网络(Juniper Networks)公司的Junos OS 的升级版系统。 Juniper Networks Junos OS Evolved存在安全漏洞,该漏洞源于存在用户控制密钥绕过授权漏洞,允许具有shell访问权限的本地身份验证攻击者完全控制设备。受影响产品如下:具有双RE的21.2R3-S8-EVO之前版本、 21.4-EVO至21.4R3-S8-EVO版本、22.2-EVO至22.2R3-S4-EVO版本、22.3
CVSS Information
N/A
Vulnerability Type
N/A