An Improper Initialization vulnerability in Juniper Networks Junos OS Evolved may cause a commit operation for disabling the telnet service to not take effect as expected, resulting in the telnet service staying enabled. When it is not intended to be operating on the device, an administrator can issue the following command to verify whether telnet is operating in the background: user@device > show system connections | grep :23 tcp 0 0 0.0.0.0:23 0.0.0.0:* LISTEN 20879/xinetd This issue affects: Juniper Networks Junos OS Evolved All versions prior to 20.4R2-S2-EVO; 21.1 version 21.1R1-EVO and later versions; 21.2 versions prior to 21.2R2-EVO.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA11272 | Vendor Advisory |
https://kb.juniper.net/JSA11272 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.juniper.net/JSA11272 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 6.5 |
Information
Published : 2022-01-19 01:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22164
Mitre link : CVE-2022-22164
CVE.ORG link : CVE-2022-22164
JSON object : View
Products Affected
juniper
- junos_os_evolved
CWE
CWE-665
Improper Initialization