9
CVE-2021-31350
- EPSS 0.34%
- Published 19.10.2021 19:15:08
- Last modified 21.11.2024 06:05:28
- Source sirt@juniper.net
- Teams watchlist Login
- Open Login
An Improper Privilege Management vulnerability in the gRPC framework, used by the Juniper Extension Toolkit (JET) API on Juniper Networks Junos OS and Junos OS Evolved, allows a network-based, low-privileged authenticated attacker to perform operations as root, leading to complete compromise of the targeted system. The issue is caused by the JET service daemon (jsd) process authenticating the user, then passing configuration operations directly to the management daemon (mgd) process, which runs as root. This issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R1-S8, 18.4R2-S8, 18.4R3-S8; 19.1 versions prior to 19.1R2-S3, 19.1R3-S5; 19.2 versions prior to 19.2R1-S7, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1. Juniper Networks Junos OS Evolved: All versions prior to 20.4R2-EVO; 21.1-EVO versions prior to 21.1R2-EVO.
Data is provided by the National Vulnerability Database (NVD)
Juniper ≫ Junos Os Evolved Version18.3 Updater1
Juniper ≫ Junos Os Evolved Version19.1 Updater1
Juniper ≫ Junos Os Evolved Version19.1 Updater2
Juniper ≫ Junos Os Evolved Version19.2 Updater1
Juniper ≫ Junos Os Evolved Version19.2 Updater2
Juniper ≫ Junos Os Evolved Version19.3 Updater1
Juniper ≫ Junos Os Evolved Version19.3 Updater2
Juniper ≫ Junos Os Evolved Version19.4 Updater1
Juniper ≫ Junos Os Evolved Version19.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.1 Updater1
Juniper ≫ Junos Os Evolved Version20.1 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.1 Updater2
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s1
Juniper ≫ Junos Os Evolved Version20.1 Updater2-s2
Juniper ≫ Junos Os Evolved Version20.2 Updater1
Juniper ≫ Junos Os Evolved Version20.2 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.2 Updater2
Juniper ≫ Junos Os Evolved Version20.3 Updater1
Juniper ≫ Junos Os Evolved Version20.3 Updater1-s1
Juniper ≫ Junos Os Evolved Version20.3 Updater2
Juniper ≫ Junos Os Evolved Version20.4 Updater1
Juniper ≫ Junos Os Evolved Version21.1
Juniper ≫ Junos Os Evolved Version21.1 Updater1-s1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.34% | 0.538 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9 | 8 | 10 |
AV:N/AC:L/Au:S/C:C/I:C/A:C
|
sirt@juniper.net | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-269 Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.