CVE-2023-28973

7.1 HIGH

📋 TL;DR

This CVE allows local authenticated attackers on Juniper Junos OS Evolved systems to execute administrative commands through the 'sysmanctl' shell command, bypassing proper authorization checks. Attackers can perform disruptive actions like daemon restarts, routing engine switchovers, and system shutdowns. Only systems running affected Junos OS Evolved versions are vulnerable.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO; 21.4 versions prior to 21.4R1-S2-EVO, 21.4R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Only accessible from Junos shell, not from Junos CLI. Requires local authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system shutdown or routing disruption causing network outages and service downtime

🟠

Likely Case

Disruption of network services through daemon restarts or routing engine switchovers

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place

🌐 Internet-Facing: LOW - Requires local authenticated access, not remotely exploitable
🏢 Internal Only: HIGH - Local authenticated attackers can cause significant disruption to network infrastructure

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access to Junos shell. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.4R3-S5-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-S2-EVO, or 21.4R2-EVO

Vendor Advisory: https://supportportal.juniper.net/JSA70597

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate fixed version from Juniper support portal. 3. Follow Juniper upgrade procedures for Junos OS Evolved. 4. Reboot system after upgrade.

🔧 Temporary Workarounds

Restrict Junos Shell Access

all

Limit access to Junos shell to only authorized administrators

Configure user permissions to restrict shell access

Monitor sysmanctl Usage

all

Implement logging and monitoring for sysmanctl command execution

Configure audit logging for shell commands

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access Junos shell
  • Monitor for unauthorized sysmanctl command usage and implement alerting

🔍 How to Verify

Check if Vulnerable:

Run 'show version' and compare against affected version ranges

Check Version:

show version

Verify Fix Applied:

After patching, verify version is 20.4R3-S5-EVO or higher, 21.2R3-EVO or higher, 21.3R2-EVO or higher, or 21.4R1-S2-EVO/21.4R2-EVO or higher

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized sysmanctl command execution
  • Unexpected daemon restarts or system shutdowns

Network Indicators:

  • Unexpected routing changes or network instability

SIEM Query:

Search for 'sysmanctl' command execution in system logs from unauthorized users

🔗 References

📤 Share & Export