CVE-2024-39522

7.8 HIGH

📋 TL;DR

This vulnerability allows local authenticated users with low privileges on Juniper Junos OS Evolved to escalate to root privileges by executing specific CLI commands with crafted parameters. It affects Junos OS Evolved 22.3-EVO versions before 22.3R2-EVO and 22.4-EVO versions before 22.4R1-S1-EVO and 22.4R2-EVO.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: 22.3-EVO versions before 22.3R2-EVO, 22.4-EVO versions before 22.4R1-S1-EVO and 22.4R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with local authenticated users having CLI access; requires specific crafted command parameters.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root access, allowing complete control over the device, data exfiltration, persistence, and lateral movement.

🟠

Likely Case

Privilege escalation from low-privilege authenticated user to root, enabling unauthorized configuration changes, service disruption, and credential harvesting.

🟢

If Mitigated

Limited impact if proper access controls restrict low-privilege user access and command execution.

🌐 Internet-Facing: LOW - Requires local authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Exploitable by any authenticated low-privilege user with CLI access, posing significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access but simple command execution with crafted parameters.

Exploitation details are not publicly disclosed; requires local authenticated access with low privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.3R2-EVO, 22.4R1-S1-EVO, or 22.4R2-EVO

Vendor Advisory: https://supportportal.juniper.net/JSA82975

Restart Required: Yes

Instructions:

1. Download the patched version from Juniper support. 2. Backup configuration. 3. Install the update via CLI or management interface. 4. Reboot the device as required.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to low-privilege users by modifying user permissions or disabling unnecessary accounts.

set system login user <username> class <restricted-class>
delete system login user <username>

🧯 If You Can't Patch

  • Implement strict access controls to limit CLI access to trusted users only.
  • Monitor and audit CLI command execution for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check Junos OS Evolved version using 'show version' and compare to affected versions.

Check Version:

show version

Verify Fix Applied:

After patching, verify version is 22.3R2-EVO or later, or 22.4R1-S1-EVO/22.4R2-EVO or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command executions by low-privilege users
  • Privilege escalation attempts in system logs

Network Indicators:

  • N/A - Local exploitation only

SIEM Query:

Search for CLI command logs from low-privilege users containing crafted parameters or privilege changes.

🔗 References

📤 Share & Export