CVE-2023-28973 — Improper Authorization in Networks Junos OS Evolved
Severity
7.1HIGHNVD
EPSS
0.0%
top 89.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 17
Latest updateApr 18
Description
An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability. Administrative functions such as daemon restarting, routing engine (RE) switchover, and node shutdown can all be performed through exploitation of the 'sysmanctl' command. Access to the 'sysmanctl' command is only available from the Junos shell. …
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.8 | Impact: 5.2
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-qxqf-752w-278r: An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker t↗2023-04-18
CVEList▶
Junos OS Evolved: The 'sysmanctl' shell command allows a local user to gain access to some administrative actions↗2023-04-17
📋Vendor Advisories
1Juniper▶
CVE-2023-28973: An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker t↗2023-04-17