目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2023-44201— Juniper Networks Junos OS 和 Junos OS Evolved 安全漏洞

CVSS 5.0 · Medium EPSS 0.04% · P11
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2023-44201の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Junos OS and Junos OS Evolved: A local attacker can retrieve sensitive information and elevate privileges on the device to an authorized user.
ソース: NVD (National Vulnerability Database)
脆弱性説明
An Incorrect Permission Assignment for Critical Resource vulnerability in a specific file of Juniper Networks Junos OS and Junos OS Evolved allows a local authenticated attacker to read configuration changes without having the permissions. When a user with the respective permissions commits a configuration change, a specific file is created. That file is readable even by users with no permissions to access the configuration. This can lead to privilege escalation as the user can read the password hash when a password change is being committed. This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S4; * 21.1 versions prior to 21.1R3-S4; * 21.2 versions prior to 21.2R3-S2; * 21.3 versions prior to 21.3R2-S2, 21.3R3-S1; * 21.4 versions prior to 21.4R2-S1, 21.4R3. Juniper Networks Junos OS Evolved * All versions prior to 20.4R3-S4-EVO; * 21.1 versions prior to 21.1R3-S2-EVO; * 21.2 versions prior to 21.2R3-S2-EVO; * 21.3 versions prior to 21.3R3-S1-EVO; * 21.4 versions prior to 21.4R2-S2-EVO.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
关键资源的不正确权限授予
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Junos OS 和 Junos OS Evolved 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Junos OS和Juniper Networks Junos OS Evolved都是美国瞻博网络(Juniper Networks)公司的产品。Juniper Networks Junos OS是一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。Juniper Networks Junos OS Evolved是Junos OS 的升级版系统。 Juniper Networks Junos OS 和 Junos OS Evol
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksJunos OS 0 ~ 20.4R3-S4 -
Juniper NetworksJunos OS Evolved 0 ~ 20.4R3-S4-EVO -

II. CVE-2023-44201の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2023-44201のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2023-10-12 · 25 CVEs total

CVE-2023-441948.4 HIGHJunos OS: An unauthenticated attacker with local access to the device can create a backdoo
CVE-2023-441997.5 HIGHJunos OS: MX Series: In a PTP scenario a prolonged routing protocol churn can trigger an F
CVE-2023-441977.5 HIGHJunos OS and Junos OS Evolved: An rpd crash may occur when BGP is processing newly learned
CVE-2023-368417.5 HIGHJunos OS: MX Series: Receipt of malformed TCP traffic will cause a Denial of Service
CVE-2023-368437.5 HIGHJunos OS: SRX Series: The PFE will crash on receiving malformed SSL traffic when Sky ATP i
CVE-2023-441927.5 HIGHJunos OS: QFX5000 Series: DMA memory leak is observed when specific DHCP packets are trans
CVE-2023-441917.5 HIGHJunos OS: QFX5000 Series and EX4000 Series: Denial of Service (DoS) on a large scale VLAN
CVE-2023-441857.5 HIGHJunos OS and Junos OS Evolved: In an BGP scenario RPD crashes upon receiving and processin
CVE-2023-441817.5 HIGHJunos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment
CVE-2023-441827.3 HIGHJunos OS and Junos OS Evolved: An Unchecked Return Value in multiple users interfaces affe
CVE-2023-441846.5 MEDIUMJunos OS and Junos OS Evolved: High CPU load due to specific NETCONF command
CVE-2023-223926.5 MEDIUMJunos OS: PTX Series and QFX10000 Series: Received flow-routes which aren't installed as t
CVE-2023-368396.5 MEDIUMJunos OS and Junos OS Evolved: An l2cpd crash will occur when specific LLDP packets are re
CVE-2023-441756.5 MEDIUMJunos OS and Junos OS Evolved: Receipt of a specific genuine PIM packet causes RPD crash
CVE-2023-441836.5 MEDIUMJunos OS: QFX5000 Series, EX4600 Series: In a VxLAN scenario an adjacent attacker within t
CVE-2023-442046.5 MEDIUMJunos OS and Junos OS Evolved: The rpd will crash upon receiving a malformed BGP UPDATE me
CVE-2023-441966.5 MEDIUMJunos OS Evolved: PTX10003 Series: Packets which are not destined to the router can reach
CVE-2023-442036.5 MEDIUMJunos OS: QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600: Packet flooding will
CVE-2023-441985.8 MEDIUMJunos OS: SRX Series and MX Series: SIP ALG doesn't drop specifically malformed retransmit
CVE-2023-441785.5 MEDIUMJunos OS : Stack overflow vulnerability in CLI command processing

Showing 20 of 25 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2023-44201へのコメント

まだコメントはありません


コメントを残す