7.3

CVE-2026-21916

Junos OS: A low privileged user can escalate their privileges so that they can login as root

A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Networks Junos OS allows a local, authenticated attacker with low privileges to escalate their privileges to root which will lead to a complete compromise of the system.

When after a user has performed a specific 'file link ...' CLI operation, another user commits (unrelated configuration changes), the first user can login as root.

This issue affects Junos OS:
  *  all versions before 23.2R2-S7,
  *  23.4 versions before 23.4R2-S6,
  *  24.2 versions before 24.2R2-S3,
  *  24.4 versions before 24.4R2-S2,
  *  25.2 versions before 25.2R2.


This issue does not affect versions 25.4R1 or later.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version < 23.2
JuniperJunos Version23.2 Update-
JuniperJunos Version23.2 Updater1
JuniperJunos Version23.2 Updater1-s1
JuniperJunos Version23.2 Updater1-s2
JuniperJunos Version23.2 Updater2
JuniperJunos Version23.2 Updater2-s1
JuniperJunos Version23.2 Updater2-s2
JuniperJunos Version23.2 Updater2-s3
JuniperJunos Version23.2 Updater2-s4
JuniperJunos Version23.2 Updater2-s5
JuniperJunos Version23.2 Updater2-s6
JuniperJunos Version23.4 Update-
JuniperJunos Version23.4 Updater1
JuniperJunos Version23.4 Updater1-s1
JuniperJunos Version23.4 Updater1-s2
JuniperJunos Version23.4 Updater2
JuniperJunos Version23.4 Updater2-s1
JuniperJunos Version23.4 Updater2-s2
JuniperJunos Version23.4 Updater2-s3
JuniperJunos Version23.4 Updater2-s4
JuniperJunos Version23.4 Updater2-s5
JuniperJunos Version24.2 Update-
JuniperJunos Version24.2 Updater1
JuniperJunos Version24.2 Updater1-s1
JuniperJunos Version24.2 Updater1-s2
JuniperJunos Version24.2 Updater2
JuniperJunos Version24.2 Updater2-s1
JuniperJunos Version24.2 Updater2-s2
JuniperJunos Version24.4 Update-
JuniperJunos Version24.4 Updater1
JuniperJunos Version24.4 Updater1-s2
JuniperJunos Version24.4 Updater1-s3
JuniperJunos Version24.4 Updater2
JuniperJunos Version24.4 Updater2-s1
JuniperJunos Version25.2 Update-
JuniperJunos Version25.2 Updater1
JuniperJunos Version25.2 Updater1-s1
JuniperJunos Version25.2 Updater1-s2
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.027
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
sirt@juniper.net 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
sirt@juniper.net 7 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X
CWE-61 UNIX Symbolic Link (Symlink) Following

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.