An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA70590 | Vendor Advisory |
https://supportportal.juniper.net/JSA70590 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportportal.juniper.net/JSA70590 - Vendor Advisory |
Information
Published : 2023-04-17 22:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-28966
Mitre link : CVE-2023-28966
CVE.ORG link : CVE-2023-28966
JSON object : View
Products Affected
juniper
- junos_os_evolved
CWE
CWE-276
Incorrect Default Permissions