CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
49.2%
An OS Command Injection vulnerability in gRPC Network Operations Interface (gNOI) server module of Juniper Networks Junos OS Evolved allows an authenticated, low privileged, network based attacker to inject shell commands and execute code. This issue affects Juniper Networks Junos OS Evolved 21.4 version 21.4R1-EVO and later versions prior to 22.1R1-EVO.
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 21.4 | cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
49.2%