关键信息 漏洞概述 漏洞编号: CVE-2025-52954 标题: 2025-07 Security Bulletin: Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system 影响产品 受影响产品: Junos OS Evolved 严重性 严重性等级: High CVSS评分: - CVSS v3.1: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - CVSS v4.0: 8.5 (AV:L/AC:L/ATN:PR/L/UI:N/V:C/H/I:H/A:H/SC:N/SI:N/SA:N) 问题描述 漏洞类型: Missing Authorization vulnerability in the internal virtual routing and forwarding (VRF) of Juniper Networks Junos OS Evolved. 影响: 允许本地低权限用户获得root权限,导致系统被攻陷。任何能够通过内部VRF发送数据包的低权限用户可以执行任意Junos命令并修改配置,从而危及系统。 解决方案 修复版本: - Junos OS Evolved: 22.2R3-S7-EVO, 22.4R3-S7-EVO, 23.2R2-S4-EVO, 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S2-EVO, 24.4R2-EVO, 25.2R1-EVO 及所有后续版本。 绕过方法 使用访问列表或防火墙过滤器限制对CLI的访问仅限于受信任的主机和管理员。 仅授予受信任用户shell和网络权限。 相关链接 KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Security Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVE Record