CVE-2024-39532Log File Information Exposure in Networks Junos OS

Severity
6.3MEDIUMNVD
EPSS
0.1%
top 79.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information. When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information. This issue affects: Junos OS: * All versions before 21.2R3-S9; * 21.4 versions before 21.4R3-S9; *

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:NExploitability: 1.1 | Impact: 4.7

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.2-EVO22.2R2-S1-EVO, 22.2R3-EVO+2
NVDjuniper/junos_os_evolved22.1, 22.2, 22.3+2
CVEListV5juniper_networks/junos_os21.421.4R3-S9+3
NVDjuniper/junos< 21.2+4

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Confidential information in logs can be accessed by another user2024-07-11
GHSA
GHSA-gr2q-rxqg-mrrq: An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated atta2024-07-11

📋Vendor Advisories

1
Juniper
CVE-2024-39532: An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated atta2024-07-11
CVE-2024-39532 — Log File Information Exposure | cvebase