CVE-2021-0255Execution with Unnecessary Privileges in Networks Junos OS

Severity
7.8HIGHNVD
CNA5.5
EPSS
0.0%
top 94.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateMay 24

Description

A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root. ethtraceroute is shipped with setuid permissions enabled and is owned by the root user, allowing local users to run ethtraceroute with root privileges. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D240; 17.3 versions prior to 17.3R3-S11, 17.4 versions p

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5juniper_networks/junos_os15.1X4915.1X49-D240+12
NVDjuniper/junos14 versions+13

🔴Vulnerability Details

2
GHSA
GHSA-jmwh-vhgh-wqr7: A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to e2022-05-24
CVEList
Junos OS: ethtraceroute Local Privilege Escalation vulnerability in SUID binaries2021-04-22

📋Vendor Advisories

1
Juniper
CVE-2021-0255: A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to e2021-04-22
CVE-2021-0255 — Execution with Unnecessary Privileges | cvebase