{"vulnerability": "CVE-2024-39546", "sightings": [{"uuid": "c4bafbd3-af72-4600-81b4-5f0615926577", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39546", "type": "seen", "source": "https://t.me/cvedetector/683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39546 - A Missing Authorization vulnerability in the Socke\", \n  \"Content\": \"CVE ID : CVE-2024-39546 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.\u00a0  \n  \nThis issue affects Junos OS Evolved:\u00a0  \n  \n  \n  \n  *  All versions prior to 21.2R3-S8-EVO,\u00a0  \n  *  21.4 versions prior to\u00a0 21.4R3-S6-EVO,\u00a0  \n  *  22.1 versions prior to 22.1R3-S5-EVO,\u00a0  \n  *  22.2 versions prior to 22.2R3-S3-EVO,\u00a0  \n  *  22.3 versions prior to 22.3R3-S3-EVO,\u00a0  \n  *  22.4 versions prior to 22.4R3-EVO,\u00a0  \n  *  23.2 versions prior to 23.2R2-EVO. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T19:59:57.000000Z"}]}