DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Alerts

Juniper Addresses Critical Flaws

August 21, 2023
Reading Time: 2 mins read
in Alerts

Juniper Networks, a leading networking hardware company, has responded swiftly to a pressing security concern by releasing an unplanned security update. This update aims to rectify a series of vulnerabilities discovered within the J-Web component of Junos OS, the company’s operating system.

These vulnerabilities, with an aggregated Common Vulnerability Scoring System (CVSS) rating of 9.8, are classified as Critical due to their potential for remote code execution on vulnerable systems. The vulnerabilities have a far-reaching impact, affecting all versions of Junos OS installed on SRX and EX Series devices.

In light of these security gaps, Juniper Networks has issued a statement on August 17, 2023, indicating that these vulnerabilities, if exploited in combination, could potentially empower unauthenticated attackers to execute code remotely. The J-Web interface, employed for configuring, managing, and monitoring Junos OS devices, has been identified as the entry point for these vulnerabilities.

Specifically, the flaws include two PHP external variable modification vulnerabilities (CVE-2023-36844 and CVE-2023-36845) that allow attackers to manipulate crucial environment variables, and two missing authentications for critical function vulnerabilities (CVE-2023-36846 and CVE-2023-36847) that could lead to limited damage to the file system integrity.

To address this critical issue, Juniper Networks has provided remediation measures in the form of software updates. For EX Series devices, Junos OS versions 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, and subsequent releases have integrated the necessary fixes.

Similarly, for SRX Series devices, the security patches are available in Junos OS versions 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, and their subsequent iterations. Users are strongly advised to apply these updates to avert the potential threats associated with remote code execution.

As an interim solution, Juniper Networks also proposes two additional security measures. The first involves disabling the J-Web interface altogether, which would eliminate the entry point for potential attackers. The second recommendation is to restrict access to the J-Web interface exclusively to trusted hosts, thereby reducing the attack surface. With these prompt actions and security advisories, Juniper Networks aims to safeguard its customers from the risks posed by these critical vulnerabilities.

Source:
  • J-Web Interface—Application Package
Tags: AlertsAlerts 2023August 2023CVSSCyberattackCybersecurityJ-WebJuniper NetworksJunos OSVulnerabilities
29
VIEWS
ADVERTISEMENT

Related Posts

Critical WordPress Plugin Flaws

Critical WordPress Plugin Flaws

September 29, 2023
Cisco Warns of Critical SD-WAN Flaw

Cisco Warns of Critical SD-WAN Flaw

September 29, 2023
Malicious Packages on npm and PyPI

Malicious Packages on npm and PyPI

September 29, 2023
Critical WordPress Plugin Flaws

Critical SharePoint Vulnerabilities Revealed

September 29, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Cyber Briefing

September 22, 2023 – Cyber Briefing

September 22, 2023
Alerts

Chinese-Language Phishing Campaigns

September 20, 2023
Cyber Briefing

September 21, 2023 – Cyber Briefing

September 21, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.