An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malicious attacker with physical access to the console to resume a previous session and possibly gain administrative privileges. This issue affects Junos OS Evolved: * from 23.2R2-EVO before 23.2R2-S1-EVO,  * from 23.4R1-EVO before 23.4R2-EVO.
References
History

Fri, 07 Feb 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Juniper junos Os Evolved
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*
Vendors & Products Juniper junos Os Evolved

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-08-02T04:26:15.874Z

Reserved: 2024-06-25T15:12:53.237Z

Link: CVE-2024-39512

cve-icon Vulnrichment

Updated: 2024-07-12T16:25:26.782Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-10T23:15:10.393

Modified: 2025-02-07T19:36:39.607

Link: CVE-2024-39512

cve-icon Redhat

No data.