CVE-2024-39544

5.0 MEDIUM

📋 TL;DR

A local privilege escalation vulnerability in Juniper Junos OS Evolved allows low-privileged local users to read NETCONF traceoptions files containing sensitive system information. This affects all Junos OS Evolved platforms with NETCONF traceoptions configured. The vulnerability exposes configuration data, credentials, and other confidential information to unauthorized local users.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions before 20.4R3-S9-EVO, 21.2-EVO before 21.2R3-S7-EVO, 21.4-EVO before 21.4R3-S5-EVO, 22.1-EVO before 22.1R3-S5-EVO, 22.2-EVO before 22.2R3-S3-EVO, 22.3-EVO before 22.3R3-EVO, 22.3R3-S2-EVO, 22.4-EVO before 22.4R3-EVO, 23.2-EVO before 23.2R1-S2-EVO, 23.2R2-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when NETCONF traceoptions are configured. Systems without NETCONF traceoptions enabled are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privileged attacker gains access to sensitive NETCONF configuration files containing credentials, system configurations, and potentially authentication tokens, leading to full system compromise.

🟠

Likely Case

Local user reads sensitive NETCONF trace files containing configuration details, passwords, or system information that could be used for further attacks.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place, though sensitive information exposure still occurs.

🌐 Internet-Facing: LOW - Requires local access to the system, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers with low privileges can access sensitive files, but requires existing access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and low-privileged user account. The vulnerability is simple to exploit once an attacker has local access to the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.4R3-S5-EVO, 22.1R3-S5-EVO, 22.2R3-S3-EVO, 22.3R3-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R1-S2-EVO, 23.2R2-EVO or later

Vendor Advisory: https://supportportal.juniper.net/JSA88106

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Juniper support portal. 2. Backup current configuration. 3. Install the update following Juniper's upgrade procedures. 4. Reboot the system as required. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable NETCONF traceoptions

all

Remove NETCONF traceoptions configuration to prevent creation of vulnerable files

delete system services netconf traceoptions

Adjust file permissions manually

linux

Manually change permissions on existing NETCONF traceoptions files to restrict access

chmod 640 /var/log/netconf-trace*

🧯 If You Can't Patch

  • Disable NETCONF traceoptions if not required for operations
  • Implement strict access controls and monitor for unauthorized file access attempts

🔍 How to Verify

Check if Vulnerable:

Check if NETCONF traceoptions are configured: 'show configuration system services netconf traceoptions'. Check file permissions: 'ls -la /var/log/netconf-trace*'

Check Version:

show version

Verify Fix Applied:

Verify updated version: 'show version'. Check file permissions after fix: 'ls -la /var/log/netconf-trace*' should show restricted permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to NETCONF trace files
  • File permission change alerts
  • User privilege escalation attempts

Network Indicators:

  • None - local vulnerability only

SIEM Query:

Search for file access events on /var/log/netconf-trace* from non-privileged users

🔗 References

📤 Share & Export