64 lines
3.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-39532",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-07-11T17:15:10.403",
"lastModified": "2025-01-07T21:15:11.583",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.\n\nWhen another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.\nThis issue affects:\n\nJunos OS:\n\n\n\n * All versions before 21.2R3-S9;\n * \n\n21.4 versions before 21.4R3-S9;\n\n * 22.2 versions before 22.2R2-S1, 22.2R3;\n * 22.3 versions before 22.3R1-S1, 22.3R2;\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions before before 22.1R3-EVO;\n * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO;\n * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en Juniper Networks Junos OS y Junos OS Evolved permite que un atacante local autenticado con altos privilegios acceda a informaci\u00f3n confidencial. Cuando otro usuario realiza una operaci\u00f3n espec\u00edfica, la informaci\u00f3n confidencial se almacena como texto sin formato en un archivo de registro espec\u00edfico, de modo que un atacante con altos privilegios tenga acceso a esta informaci\u00f3n. Este problema afecta a: Junos OS: * Todas las versiones anteriores a 22.1R2-S2, * 22.1R3 y versiones posteriores, * Versiones 22.2 anteriores a 22.2R2-S1, 22.2R3, * Versiones 22.3 anteriores a 22.3R1-S2, 22.3R2; Junos OS Evolved: * Todas las versiones anteriores a 22.1R3-EVO, * Versiones 22.2-EVO anteriores a 22.2R2-S1-EVO, 22.2R3-EVO, * Versiones 22.3-EVO anteriores a 22.3R1-S1-EVO, 22.3R2-EVO."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@juniper.net",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA82992",
"source": "sirt@juniper.net"
},
{
"url": "https://supportportal.juniper.net/JSA82992",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}