Article Details

Scrape Timestamp (UTC): 2024-01-13 10:52:22.890

Source: https://thehackernews.com/2024/01/critical-rce-vulnerability-uncovered-in.html

Original Article Text

Click to Toggle View

Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches. Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability in its SRX Series firewalls and EX Series switches. The issue, tracked as CVE-2024-21591, is rated 9.8 on the CVSS scoring system. "An out-of-bounds write vulnerability in J-Web of Juniper Networks Junos OS SRX Series and EX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS) or Remote Code Execution (RCE) and obtain root privileges on the device," the company said in an advisory. The networking equipment major, which is set to be acquired by Hewlett Packard Enterprise (HPE) for $14 billion, said the issue is caused by use of an insecure function allowing a bad actor to overwrite arbitrary memory. The flaw impacts the following versions, and has been fixed in versions 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S2, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and later - As temporary workarounds until the fixes are deployed, the company recommends that users disable J-Web or restrict access to only trusted hosts. Also resolved by Juniper Networks is a high-severity bug in Junos OS and Junos OS Evolved (CVE-2024-21611, CVSS score: 7.5) that could be weaponized by an unauthenticated, network-based attacker to cause a DoS condition. While there is evidence that the vulnerabilities are being exploited in the wild, multiple security shortcomings affecting the company's SRX firewalls and EX switches were abused by threat actors last year. Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and Hot to Mitigate Them. Master Cloud Security - Get FREE eBook Comprehensive eBook covering cloud security across infrastructure, containers, and runtime environments for security professionals

Daily Brief Summary

CYBERCRIME // Critical Flaw in Juniper Networks Devices Allows Remote Takeover

Juniper Networks has fixed a critical remote code execution (RCE) vulnerability in its SRX firewalls and EX Series switches, labeled CVE-2024-21591 with a CVSS score of 9.8.

The vulnerability allowed unauthenticated network-based attackers to execute code or cause denial-of-service (DoS), potentially gaining root privileges on the devices.

Specific versions of Junos OS were affected by the out-of-bounds write issue, which has been addressed in multiple recent software releases.

Juniper recommends disabling J-Web or limiting access to trusted hosts as interim measures until patches can be applied.

Another high-severity bug in Junos OS, CVE-2024-21611, was also patched. This vulnerability could lead to a DoS attack.

There's evidence that similar vulnerabilities in Juniper’s products were previously exploited, implying active interest from cybercriminals in targeting these devices.

Users and administrators of Juniper devices are advised to apply the updates as soon as possible to safeguard against potential exploitation of the flaws.