Vulnerability Description
An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account. When the console cable is disconnected, the logged in user is not logged out. This allows a malicious attacker with physical access to the console to resume a previous session and possibly gain administrative privileges. This issue affects Junos OS Evolved: * from 23.2R2-EVO before 23.2R2-S1-EVO, * from 23.4R1-EVO before 23.4R2-EVO.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos Os Evolved | 23.2 |
Related Weaknesses (CWE)
References
- https://supportportal.juniper.net/JSA82977Vendor Advisory
- https://supportportal.juniper.net/JSA82977Vendor Advisory
FAQ
What is CVE-2024-39512?
CVE-2024-39512 is a vulnerability with a CVSS score of 6.6 (MEDIUM). An Improper Physical Access Control vulnerability in the console port control of Juniper Networks Junos OS Evolved allows an attacker with physical access to the device to get access to a user account...
How severe is CVE-2024-39512?
CVE-2024-39512 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-39512?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos Os Evolved.