CVE-2023-44201

MEDIUM

Juniper Junos < 20.4 - Incorrect Permission Assignment

Title source: rule
STIX 2.1

Description

An Incorrect Permission Assignment for Critical Resource vulnerability in a specific file of Juniper Networks Junos OS and Junos OS Evolved allows a local authenticated attacker to read configuration changes without having the permissions. When a user with the respective permissions commits a configuration change, a specific file is created. That file is readable even by users with no permissions to access the configuration. This can lead to privilege escalation as the user can read the password hash when a password change is being committed. This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S4; * 21.1 versions prior to 21.1R3-S4; * 21.2 versions prior to 21.2R3-S2; * 21.3 versions prior to 21.3R2-S2, 21.3R3-S1; * 21.4 versions prior to 21.4R2-S1, 21.4R3. Juniper Networks Junos OS Evolved * All versions prior to 20.4R3-S4-EVO; * 21.1 versions prior to 21.1R3-S2-EVO; * 21.2 versions prior to 21.2R3-S2-EVO; * 21.3 versions prior to 21.3R3-S1-EVO; * 21.4 versions prior to 21.4R2-S2-EVO.

References (1)

Core 1
Core References
Broken Link vendor-advisory
https://supprtportal.juniper.net/JSA73167

Scores

CVSS v3 5.0
EPSS 0.0004
EPSS Percentile 11.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-732
Status published
Products (7)
juniper/junos 20.4 (10 CPE variants)
juniper/junos 21.1 (10 CPE variants)
juniper/junos 21.2 (9 CPE variants)
juniper/junos 21.3 (6 CPE variants)
juniper/junos 21.4 (5 CPE variants)
juniper/junos < 20.4
juniper/junos_os_evolved 20.4 (9 CPE variants)
Published Oct 13, 2023
Tracked Since Feb 18, 2026