CVE-2024-39532 — Log File Information Exposure in Networks Junos OS
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 79.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Description
An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.
When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.
This issue affects:
Junos OS:
* All versions before 21.2R3-S9;
*
21.4 versions before 21.4R3-S9;
* …
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:NExploitability: 1.1 | Impact: 4.7
Affected Packages4 packages
🔴Vulnerability Details
2CVEList▶
Junos OS and Junos OS Evolved: Confidential information in logs can be accessed by another user↗2024-07-11
GHSA▶
GHSA-gr2q-rxqg-mrrq: An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated atta↗2024-07-11
📋Vendor Advisories
1Juniper▶
CVE-2024-39532: An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated atta↗2024-07-11