Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mjfx-92v4-6mf3

Опубликовано: 11 окт. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 5.3
CVSS3: 5.4

Описание

An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address of the subnet assigned to an interface. This is unintended and unexpected behavior and can allow an attacker to bypass certain compensating controls, such as stateless firewall filters.

This issue affects Junos OS Evolved: 

  • All versions before 21.4R3-S8-EVO, 
  • 22.2-EVO before 22.2R3-S4-EVO, 
  • 22.3-EVO before 22.3R3-S4-EVO, 
  • 22.4-EVO before 22.4R3-S3-EVO, 
  • 23.2-EVO before 23.2R2-S1-EVO, 
  • 23.4-EVO before 23.4R1-S2-EVO, 23.4R2-EVO.

An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address of the subnet assigned to an interface. This is unintended and unexpected behavior and can allow an attacker to bypass certain compensating controls, such as stateless firewall filters.

This issue affects Junos OS Evolved: 

  • All versions before 21.4R3-S8-EVO, 
  • 22.2-EVO before 22.2R3-S4-EVO, 
  • 22.3-EVO before 22.3R3-S4-EVO, 
  • 22.4-EVO before 22.4R3-S3-EVO, 
  • 23.2-EVO before 23.2R2-S1-EVO, 
  • 23.4-EVO before 23.4R1-S2-EVO, 23.4R2-EVO.

EPSS

Процентиль: 8%
0.00031
Низкий

5.3 Medium

CVSS4

5.4 Medium

CVSS3

Дефекты

CWE-697

Связанные уязвимости

CVSS3: 5.4
nvd
больше 1 года назад

An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address of the subnet assigned to an interface. This is unintended and unexpected behavior and can allow an attacker to bypass certain compensating controls, such as stateless firewall filters. This issue affects Junos OS Evolved:  * All versions before 21.4R3-S8-EVO,  * 22.2-EVO before 22.2R3-S4-EVO,  * 22.3-EVO before 22.3R3-S4-EVO,  * 22.4-EVO before 22.4R3-S3-EVO,  * 23.2-EVO before 23.2R2-S1-EVO,  * 23.4-EVO before 23.4R1-S2-EVO, 23.4R2-EVO.

CVSS3: 5.4
fstec
больше 1 года назад

Уязвимость реализации прикладного программного интерфейса операционных систем Juniper Networks Junos OS Evolved, позволяющая нарушителю обойти ограничения безопасности

EPSS

Процентиль: 8%
0.00031
Низкий

5.3 Medium

CVSS4

5.4 Medium

CVSS3

Дефекты

CWE-697