CVE-2022-22187

An Improper Privilege Management vulnerability in the Windows Installer framework used in the Juniper Networks Juniper Identity Management Service (JIMS) allows an unprivileged user to trigger a repair operation. Running a repair operation, in turn, will trigger a number of file operations in the %TEMP% folder of the user triggering the repair. Some of these operations will be performed from a SYSTEM context (started via the Windows Installer service), including the execution of temporary files. An attacker may be able to provide malicious binaries to the Windows Installer, which will be executed with high privilege, leading to a local privilege escalation. This issue affects Juniper Networks Juniper Identity Management Service (JIMS) versions prior to 1.4.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:juniper:identity_management_service:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 06:46

Type Values Removed Values Added
References () https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0029/MNDT-2022-0029.md - Third Party Advisory () https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0029/MNDT-2022-0029.md - Third Party Advisory
References () https://kb.juniper.net/JSA69495 - Permissions Required, Vendor Advisory () https://kb.juniper.net/JSA69495 - Permissions Required, Vendor Advisory

Information

Published : 2022-04-14 16:15

Updated : 2024-11-21 06:46


NVD link : CVE-2022-22187

Mitre link : CVE-2022-22187

CVE.ORG link : CVE-2022-22187


JSON object : View

Products Affected

juniper

  • identity_management_service
CWE
CWE-269

Improper Privilege Management