NFX Series devices using Juniper Networks Junos OS are susceptible to a local command execution vulnerability thereby allowing an attacker to elevate their privileges via the Junos Device Management Daemon (JDMD) process. This issue affects Juniper Networks Junos OS on NFX Series 17.2 version 17.2R1 and later versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S5, 18.4R3-S5; 19.1 versions prior to 19.1R1-S3; 19.2 version 19.1R2 and later versions prior to 19.2R3; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2-S2. 19.4 versions 19.4R3 and above. This issue does not affect Juniper Networks Junos OS versions prior to 17.2R1. This issue does not affect the JDMD as used by Junos Node Slicing such as External Servers use in conjunction with Junos Node Slicing and In-Chassis Junos Node Slicing on MX480, MX960, MX2008, MX2010, MX2020.
References
Link | Resource |
---|---|
https://github.com/orangecertcc/security-research/security/advisories/GHSA-vrf9-cjcp-rwcr | Exploit Third Party Advisory |
https://kb.juniper.net/JSA11146 | Vendor Advisory |
https://github.com/orangecertcc/security-research/security/advisories/GHSA-vrf9-cjcp-rwcr | Exploit Third Party Advisory |
https://kb.juniper.net/JSA11146 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/orangecertcc/security-research/security/advisories/GHSA-vrf9-cjcp-rwcr - Exploit, Third Party Advisory | |
References | () https://kb.juniper.net/JSA11146 - Vendor Advisory |
Information
Published : 2021-04-22 20:15
Updated : 2024-11-21 05:42
NVD link : CVE-2021-0253
Mitre link : CVE-2021-0253
CVE.ORG link : CVE-2021-0253
JSON object : View
Products Affected
juniper
- nfx250
- nfx150
- junos
- nfx350
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')