CVE-2021-31360Improper Input Validation in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.0%
top 88.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 24

Description

An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privileged user to overwrite local files as root, possibly leading to a system integrity issue or Denial of Service (DoS). Depending on the files overwritten, exploitation of this vulnerability could lead to a sustained Denial of Service (DoS) condition, requiring manual user intervention to recover. Systems are only vulnerable if jdhcpd is running, whi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.4R2-S3-EVO+1
CVEListV5juniper_networks/junos_os15.115.1R7-S10+12
NVDjuniper/junos13 versions+12

🔴Vulnerability Details

2
GHSA
GHSA-j6cc-h7v7-4cvc: An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privi2022-05-24
CVEList
Junos OS and Junos OS Evolved: Denial of Service vulnerability in local file processing2021-10-19

📋Vendor Advisories

1
Juniper
CVE-2021-31360: An improper privilege management vulnerability in the Juniper Networks Junos OS and Junos OS Evolved command-line interpreter (CLI) allows a low-privi2021-10-19
CVE-2021-31360 — Improper Input Validation | cvebase