CVE-2022-22239 (GCVE-0-2022-22239)

Vulnerability from cvelistv5 – Published: 2022-10-18 02:46 – Updated: 2025-05-10 02:34
VLAI?
Summary
An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows a locally authenticated attacker with access to the ssh operational command to escalate their privileges on the system to root, or if there is user interaction on the local device to potentially escalate privileges on a remote system to root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-EVO; 21.2-EVO versions prior to 21.2R2-S1-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS.
CWE
  • CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
Vendor Product Version
Juniper Networks Junos OS Evolved Affected: unspecified , < 20.4R3-S5-EVO (custom)
Affected: 21.1-EVO , < 21.1R3-EVO (custom)
Affected: 21.2-EVO , < 21.2R2-S1-EVO, 21.2R3-EVO (custom)
Affected: 21.3-EVO , < 21.3R2-EVO (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:07:49.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://kb.juniper.net/JSA69895"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-22239",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-10T02:34:04.074427Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-10T02:34:30.513Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Junos OS Evolved",
          "vendor": "Juniper Networks",
          "versions": [
            {
              "lessThan": "20.4R3-S5-EVO",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "21.1R3-EVO",
              "status": "affected",
              "version": "21.1-EVO",
              "versionType": "custom"
            },
            {
              "lessThan": "21.2R2-S1-EVO, 21.2R3-EVO",
              "status": "affected",
              "version": "21.2-EVO",
              "versionType": "custom"
            },
            {
              "lessThan": "21.3R2-EVO",
              "status": "affected",
              "version": "21.3-EVO",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-10-12T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows a locally authenticated attacker with access to the ssh operational command to escalate their privileges on the system to root, or if there is user interaction on the local device to potentially escalate privileges on a remote system to root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-EVO; 21.2-EVO versions prior to 21.2R2-S1-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-250",
              "description": "CWE-250 Execution with Unnecessary Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-18T00:00:00.000Z",
        "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
        "shortName": "juniper"
      },
      "references": [
        {
          "url": "https://kb.juniper.net/JSA69895"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and all subsequent releases."
        }
      ],
      "source": {
        "advisory": "JSA69895",
        "defect": [
          "1621892"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Junos OS Evolved: The ssh CLI command always runs as root which can lead to privilege escalation",
      "workarounds": [
        {
          "lang": "en",
          "value": "A workaround for this issue is to modify the applicable login class(es) so that the ssh command can not be accessed anymore. This can be done by removing the \u0027network\u0027 permission or modifying the resp. allow-/deny-commands configuration."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
    "assignerShortName": "juniper",
    "cveId": "CVE-2022-22239",
    "datePublished": "2022-10-18T02:46:41.384Z",
    "dateReserved": "2021-12-21T00:00:00.000Z",
    "dateUpdated": "2025-05-10T02:34:30.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"20.4\", \"matchCriteriaId\": \"0F41A7DF-2B27-4E2E-ABFC-E0510A028199\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"247FB9DF-7EC0-4298-B27C-3235D141C1D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9C8866D-162F-4C9B-8167-2FBA25410368\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F85E5BC7-8607-4330-AA72-2273D32F8604\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"878C81C9-A418-4A21-8FDB-2116A992679C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7451A671-A3CC-4904-8D45-947B1D3783C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0108AD20-EAE6-41D1-AE48-254C46B5388A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E554FD12-FE69-44D1-B2C9-4382F8CA4456\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0C1D53E-70BE-4246-89ED-1074C8C70747\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"B38A90A9-B739-49BE-8845-9ABF846CCC5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAE56A7C-BA26-405F-A640-C43AF78B0A3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*\", \"matchCriteriaId\": \"683D8EED-9F26-41E7-B69C-FE198225A8F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"52C3552E-798F-4719-B38D-F74E34EAAA40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE674DD3-3590-4434-B144-5AD7EB5F039D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0099BDA9-9D4B-4D6C-8234-EFD9E8C63476\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8729BC1-FB09-4E6D-A5D5-8BDC589555B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"620B0CDD-5566-472E-B96A-31D2C12E3120\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E1E57AF-979B-4022-8AD6-B3558E06B718\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*\", \"matchCriteriaId\": \"144730FB-7622-4B3D-9C47-D1B7A7FB7EB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BA246F0-154E-4F44-A97B-690D22FA73DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EC38173-44AB-43D5-8C27-CB43AD5E0B2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A4DD04A-DE52-46BE-8C34-8DB47F7500F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEE0E145-8E1C-446E-90ED-237E3B9CAF47\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows a locally authenticated attacker with access to the ssh operational command to escalate their privileges on the system to root, or if there is user interaction on the local device to potentially escalate privileges on a remote system to root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-EVO; 21.2-EVO versions prior to 21.2R2-S1-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de ejecuci\\u00f3n con privilegios innecesarios en Management Daemon (mgd) de Juniper Networks Junos OS Evolved permite a un atacante autenticado localmente con privilegios bajos escalar sus privilegios en el dispositivo y potencialmente en sistemas remotos. Esta vulnerabilidad permite a un atacante autenticado localmente con acceso al comando operativo ssh escalar sus privilegios en el sistema a root, o si se presenta interacci\\u00f3n de usuarios en el dispositivo local, escalar potencialmente los privilegios en un sistema remoto a root. Este problema afecta a Juniper Networks Junos OS Evolved: Todas las versiones anteriores a 20.4R3-S5-EVO; las versiones 21.1-EVO anteriores a 21.1R3-EVO; las versiones 21.2-EVO anteriores a 21.2R2-S1-EVO, 21.2R3-EVO; las versiones 21.3-EVO anteriores a 21.3R2-EVO. Este problema no afecta a Juniper Networks Junos OS\"}]",
      "id": "CVE-2022-22239",
      "lastModified": "2024-11-21T06:46:27.827",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.5, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 6.0}]}",
      "published": "2022-10-18T03:15:10.817",
      "references": "[{\"url\": \"https://kb.juniper.net/JSA69895\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://kb.juniper.net/JSA69895\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "sirt@juniper.net",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-250\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-22239\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2022-10-18T03:15:10.817\",\"lastModified\":\"2024-11-21T06:46:27.827\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows a locally authenticated attacker with access to the ssh operational command to escalate their privileges on the system to root, or if there is user interaction on the local device to potentially escalate privileges on a remote system to root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-EVO; 21.2-EVO versions prior to 21.2R2-S1-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de ejecuci\u00f3n con privilegios innecesarios en Management Daemon (mgd) de Juniper Networks Junos OS Evolved permite a un atacante autenticado localmente con privilegios bajos escalar sus privilegios en el dispositivo y potencialmente en sistemas remotos. Esta vulnerabilidad permite a un atacante autenticado localmente con acceso al comando operativo ssh escalar sus privilegios en el sistema a root, o si se presenta interacci\u00f3n de usuarios en el dispositivo local, escalar potencialmente los privilegios en un sistema remoto a root. Este problema afecta a Juniper Networks Junos OS Evolved: Todas las versiones anteriores a 20.4R3-S5-EVO; las versiones 21.1-EVO anteriores a 21.1R3-EVO; las versiones 21.2-EVO anteriores a 21.2R2-S1-EVO, 21.2R3-EVO; las versiones 21.3-EVO anteriores a 21.3R2-EVO. Este problema no afecta a Juniper Networks Junos OS\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-250\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"20.4\",\"matchCriteriaId\":\"0F41A7DF-2B27-4E2E-ABFC-E0510A028199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"247FB9DF-7EC0-4298-B27C-3235D141C1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C8866D-162F-4C9B-8167-2FBA25410368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85E5BC7-8607-4330-AA72-2273D32F8604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"878C81C9-A418-4A21-8FDB-2116A992679C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7451A671-A3CC-4904-8D45-947B1D3783C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0108AD20-EAE6-41D1-AE48-254C46B5388A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E554FD12-FE69-44D1-B2C9-4382F8CA4456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0C1D53E-70BE-4246-89ED-1074C8C70747\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B38A90A9-B739-49BE-8845-9ABF846CCC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAE56A7C-BA26-405F-A640-C43AF78B0A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"683D8EED-9F26-41E7-B69C-FE198225A8F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C3552E-798F-4719-B38D-F74E34EAAA40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE674DD3-3590-4434-B144-5AD7EB5F039D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0099BDA9-9D4B-4D6C-8234-EFD9E8C63476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8729BC1-FB09-4E6D-A5D5-8BDC589555B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"620B0CDD-5566-472E-B96A-31D2C12E3120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E57AF-979B-4022-8AD6-B3558E06B718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"144730FB-7622-4B3D-9C47-D1B7A7FB7EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA246F0-154E-4F44-A97B-690D22FA73DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC38173-44AB-43D5-8C27-CB43AD5E0B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4DD04A-DE52-46BE-8C34-8DB47F7500F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE0E145-8E1C-446E-90ED-237E3B9CAF47\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA69895\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA69895\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://kb.juniper.net/JSA69895\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T03:07:49.838Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-22239\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-10T02:34:04.074427Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-10T02:34:25.409Z\"}}], \"cna\": {\"title\": \"Junos OS Evolved: The ssh CLI command always runs as root which can lead to privilege escalation\", \"source\": {\"defect\": [\"1621892\"], \"advisory\": \"JSA69895\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Juniper Networks\", \"product\": \"Junos OS Evolved\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"20.4R3-S5-EVO\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"21.1-EVO\", \"lessThan\": \"21.1R3-EVO\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"21.2-EVO\", \"lessThan\": \"21.2R2-S1-EVO, 21.2R3-EVO\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"21.3-EVO\", \"lessThan\": \"21.3R2-EVO\", \"versionType\": \"custom\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The following software releases have been updated to resolve this specific issue: 20.4R3-S5-EVO, 21.1R3-EVO, 21.2R2-S1-EVO, 21.2R3-EVO, 21.3R2-EVO, 21.4R1-EVO, and all subsequent releases.\"}], \"datePublic\": \"2022-10-12T00:00:00.000Z\", \"references\": [{\"url\": \"https://kb.juniper.net/JSA69895\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"A workaround for this issue is to modify the applicable login class(es) so that the ssh command can not be accessed anymore. This can be done by removing the \u0027network\u0027 permission or modifying the resp. allow-/deny-commands configuration.\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An Execution with Unnecessary Privileges vulnerability in Management Daemon (mgd) of Juniper Networks Junos OS Evolved allows a locally authenticated attacker with low privileges to escalate their privileges on the device and potentially remote systems. This vulnerability allows a locally authenticated attacker with access to the ssh operational command to escalate their privileges on the system to root, or if there is user interaction on the local device to potentially escalate privileges on a remote system to root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-EVO; 21.2-EVO versions prior to 21.2R2-S1-EVO, 21.2R3-EVO; 21.3-EVO versions prior to 21.3R2-EVO. This issue does not affect Juniper Networks Junos OS.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-250\", \"description\": \"CWE-250 Execution with Unnecessary Privileges\"}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2022-10-18T00:00:00.000Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-22239\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-10T02:34:30.513Z\", \"dateReserved\": \"2021-12-21T00:00:00.000Z\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"datePublished\": \"2022-10-18T02:46:41.384Z\", \"assignerShortName\": \"juniper\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…