CVE-2021-0223Execution with Unnecessary Privileges in Networks Junos OS

Severity
7.8HIGHNVD
EPSS
0.0%
top 89.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Latest updateMay 24

Description

A local privilege escalation vulnerability in telnetd.real of Juniper Networks Junos OS may allow a locally authenticated shell user to escalate privileges and execute arbitrary commands as root. telnetd.real is shipped with setuid permissions enabled and is owned by the root user, allowing local users to run telnetd.real with root privileges. This issue affects Juniper Networks Junos OS: all versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S12, 17.4R

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5juniper_networks/junos_osunspecified15.1R7-S9+12
NVDjuniper/junos13 versions+12

🔴Vulnerability Details

2
GHSA
GHSA-gxjv-3qx5-453x: A local privilege escalation vulnerability in telnetd2022-05-24
CVEList
Junos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries2021-01-15

📋Vendor Advisories

1
Juniper
CVE-2021-0223: A local privilege escalation vulnerability in telnetd.real of Juniper Networks Junos OS may allow a locally authenticated shell user to escalate privi2021-01-15
CVE-2021-0223 — Execution with Unnecessary Privileges | cvebase