Incorrect permission assignment for critical resource in Juniper Junos OS and Junos OS Evolved



Published: 2023-10-23
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-44201
CWE-ID CWE-732
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Junos OS Evolved
Operating systems & Components / Operating system

Juniper Junos OS
Operating systems & Components / Operating system

Vendor Juniper Networks, Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Incorrect permission assignment for critical resource

EUVDB-ID: #VU82303

Risk: Low

CVSSv3.1: 4.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-44201

CWE-ID: CWE-732 - Incorrect Permission Assignment for Critical Resource

Exploit availability: No

Description

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to incorrect permission assignment for critical resource in a specific file. A local user can read configuration changes without having the permissions.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Junos OS Evolved: 20.4 - 22.1-EVO

Juniper Junos OS: 20.4 - 21.4R2

External links

http://supprtportal.juniper.net/JSA73167


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###