CVE-2024-47495

6.7 MEDIUM

📋 TL;DR

An authorization bypass vulnerability in Juniper Junos OS Evolved allows locally authenticated attackers with shell access to gain full device control when Dual Routing Engines are configured. This affects Juniper Networks Junos OS Evolved devices with dual-REs across multiple versions. The vulnerability does not affect standard Junos OS.

💻 Affected Systems

Products:
  • Juniper Networks Junos OS Evolved
Versions: All versions before 21.2R3-S8-EVO, from 21.4-EVO before 21.4R3-S8-EVO, from 22.2-EVO before 22.2R3-S4-EVO, from 22.3-EVO before 22.3R3-S4-EVO, from 22.4-EVO before 22.4R3-S3-EVO, from 23.2-EVO before 23.2R2-S1-EVO, from 23.4-EVO before 23.4R2-S1-EVO
Operating Systems: Junos OS Evolved
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with Dual Routing Engines (REs) configured. Does not affect standard Junos OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local shell access can bypass authorization controls and gain full administrative control of the device, potentially compromising network infrastructure and data.

🟠

Likely Case

Malicious insiders or attackers who have gained initial foothold through other means can escalate privileges to take complete control of affected Juniper devices.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized users who would need to bypass additional security layers.

🌐 Internet-Facing: LOW - This requires local shell access, which is typically not exposed to the internet.
🏢 Internal Only: HIGH - Attackers with internal network access and shell credentials can exploit this to gain full device control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local shell access and dual-RE configuration. The vulnerability is an authorization bypass through user-controlled key.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.2R3-S8-EVO, 21.4R3-S8-EVO, 22.2R3-S4-EVO, 22.3R3-S4-EVO, 22.4R3-S3-EVO, 23.2R2-S1-EVO, 23.4R2-S1-EVO or later

Vendor Advisory: https://kb.juniper.net/JSA88122

Restart Required: Yes

Instructions:

1. Check current version with 'show version'. 2. Download appropriate patch from Juniper support. 3. Apply patch following Juniper upgrade procedures. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Disable Dual RE Configuration

all

Remove dual routing engine configuration if not required for redundancy

configure
delete chassis redundancy
commit

Restrict Shell Access

all

Limit shell access to only trusted administrators

configure
set system login user [username] class super-user
commit

🧯 If You Can't Patch

  • Implement strict access controls to limit who has shell access to devices
  • Monitor for unusual administrative activity and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if device has dual-RE configuration with 'show chassis hardware' and verify version is in affected range with 'show version'

Check Version:

show version

Verify Fix Applied:

Verify version is patched with 'show version' and check that authorization controls are functioning properly

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized privilege escalation attempts
  • Unexpected administrative access from non-privileged users
  • Changes to authorization configurations

Network Indicators:

  • Unexpected administrative connections to devices
  • Changes in routing behavior without authorization

SIEM Query:

source="juniper-firewall" AND (event_type="privilege_escalation" OR user="*" AND action="admin_access")

🔗 References

📤 Share & Export