• NL
  • FR
  • DE
  • EN
www.belgium.be Logo of the federal government

WARNING: MULTIPLE CRITICAL VULNERABILITIES FIXED IN JUNIPER DEVICES, PATCH IMMEDIATELY!

Reference: 
Advisory #2024-54
Version: 
1.0
Affected software: 
All versions of Junos OS before 23.4R1-S1, 23.4R2
All versions of Junos OS Evolved before 21.4R3-S4-EVO, 22.1-EVO, 22.3-EVO, 22.4-EVO
All versions of Juniper cRPD before 23.4R1
All versions of Juniper Cloud Native Router earlier than 23.4
Type: 
Multiple types of vulnerabilities including Out-of-bounds Write, Improper Input Validation, Unquoted Search Path or Element, Classic Buffer Overflow,…
CVE/CVSS: 

96 vulnerabilities in total, of which 8 critical vulnerabilities with a severity score of 9.8

Sources

Risks

Juniper released security updated for several of their products including Junos OS, Junos OS Evolved, cRPD & Juniper Cloud Native Router. Most of the fixes are patching vulnerabilities in third party packages used in their products. But some hardcoded credentials were also fixed in their latest software version.

In total 96 vulnerabilities are patched, 8 of these patched vulnerabilities are marked as critical. Exploitation and chaining one or more of these vulnerabilities could give an unauthenticated remote attacker full control of a Juniper device.

Description

A lot of the patched vulnerabilities reside in an outdated version of curl used in Juniper software. Along with curl, multiple vulnerabilities in Rsyslog, util-linux, pip, core-utils, ncurses, tar, OpenSSL,… where also fixed.

CVE-2024-30407, is a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud Native Router (JCNR) and containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container. Due to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.

Recommended Actions

Patch

Update your Juniper device to one of the following versions:

  • Junos OS version:
    • 23.4R1-S1
    • 23.4R2
  • Junos OS Evolved version:
    • 21.4R3-S4-EVO
    • 22.1-EVO
    • 22.3-EVO
    • 22.4-EVO
  • Juniper cRPD version 23.4R1
  • Juniper Cloud Native Router version 23.4

 

Monitor/Detect

The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via: https://cert.be/en/report-incident
 
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.

References