Vulnerability Description
An Improper Privilege Management vulnerability in the Windows Installer framework used in the Juniper Networks Juniper Identity Management Service (JIMS) allows an unprivileged user to trigger a repair operation. Running a repair operation, in turn, will trigger a number of file operations in the %TEMP% folder of the user triggering the repair. Some of these operations will be performed from a SYSTEM context (started via the Windows Installer service), including the execution of temporary files. An attacker may be able to provide malicious binaries to the Windows Installer, which will be executed with high privilege, leading to a local privilege escalation. This issue affects Juniper Networks Juniper Identity Management Service (JIMS) versions prior to 1.4.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Identity Management Service | < 1.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022Third Party Advisory
- https://kb.juniper.net/JSA69495Permissions RequiredVendor Advisory
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022Third Party Advisory
- https://kb.juniper.net/JSA69495Permissions RequiredVendor Advisory
FAQ
What is CVE-2022-22187?
CVE-2022-22187 is a vulnerability with a CVSS score of 7.8 (HIGH). An Improper Privilege Management vulnerability in the Windows Installer framework used in the Juniper Networks Juniper Identity Management Service (JIMS) allows an unprivileged user to trigger a repai...
How severe is CVE-2022-22187?
CVE-2022-22187 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-22187?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Identity Management Service.