Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
High
Attack Vector
Local
0

CVE-2024-39532

Disclosure Date: July 11, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.

When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.
This issue affects:

Junos OS:

  • All versions before 22.1R2-S2,
  • 22.1R3 and later versions,
  • 22.2 versions before 22.2R2-S1, 22.2R3,
  • 22.3 versions before 22.3R1-S2, 22.3R2;

Junos OS Evolved:

  • All versions before before 22.1R3-EVO,
  • 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO,
  • 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.3 Medium
Impact Score:
4.7
Exploitability Score:
1.1
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
Required
Scope (S):
Changed
Confidentiality (C):
High
Integrity (I):
Low
Availability (A):
None

General Information

Vendors

  • Juniper Networks

Products

  • Junos OS,
  • Junos OS Evolved

Additional Info

Technical Analysis