Patch these Juniper Networks bugs, CISA says • The Register


Juniper Networks has patched essential-rated bugs across its Junos Place, Contrail Networking and NorthStar Controller products and solutions that are severe adequate to prompt CISA to weigh in and suggest admins to update the software program as shortly as attainable.

“CISA encourages people and directors to evaluation the Juniper Networks protection advisories web page and apply the important updates,” according to the Feds’ warning this 7 days.

Critical issue below is assessment: some of these flaws can be exploited to convey down machines, or permit a rogue non-admin insider to acquire more than a box. Some may perhaps not be specifically exploitable but existing in application inside of Juniper’s products and solutions. So, assessment the threat, and update appropriately.

We will commence with the protection holes in Junos Room, the vendor’s community administration software program, which Juniper collectively rated “critical.” This is because, contrary to the essential flaws comprehensive in 3 other security bulletins revealed this 7 days, we don’t know if these particular bugs are presently currently being exploited.

All of the other products’ important security updates be aware that Juniper is not mindful of any destructive exploitation — but that detect is conspicuously absent from the Junos Space flaws and the vendor didn’t respond to The Sign-up‘s inquiries about in-the-wild exploits.

According to the bulletin, which collectively rated 31 Junos Room bugs as essential, the vulns impact various 3rd-occasion products and solutions which includes nginx resolver, Oracle Java SE, OpenSSH, Samba, the RPM offer manager, Kerberos, OpenSSL, the Linux kernel, curl, and MySQL Server.

A person of these, tracked as CVE-2021-23017 in nginx resolver, acquired a CVSS severity rating of 9.4 out of 10, and if exploited could let an attacker to crash the complete procedure. It “may possibly enable an attacker who is able to forge UDP packets from the DNS server to result in one particular-byte memory overwrite, resulting in employee process crash or possible other affect,” Juniper warned.

The networking and stability organization also issued an inform about vital vulnerabilities in Junos Space Stability Director Policy Enforcer — this piece gives centralized risk management and monitoring for computer software-described networks — but observed that it is really not knowledgeable of any malicious exploitation of these vital bugs.

Whilst the seller didn’t provide facts about the Policy Enforcer bugs, they gained a 9.8 CVSS score, and there are “multiple” vulnerabilities in this product, according to the protection bulletin. The flaws have an affect on all variations of Junos Space Coverage Enforcer prior to 22.1R1, and Juniper claimed it has fastened the challenges.

The subsequent group of crucial vulnerabilities exist in third-celebration software program utilized in the Contrail Networking products. In this protection bulletin, Juniper issued updates to handle extra than 100 CVEs that go again to 2013.

Upgrading to launch 21.4. fixes the Open up Container Initiative-compliant Pink Hat Common Foundation Impression container picture from Crimson Hat Enterprise Linux 7 to Crimson Hat Company Linux 8, the vendor discussed in the notify.

And in its fourth crucial stability bulletin issued this 7 days, Juniper fastened a distant code execution bug, tracked as CVE-2021-23017, that impacts its NorthStar Controller product or service and obtained a 9.4 CVSS rating.

The vendor described it as an “off-by-a single mistake vulnerability.” It truly is in the nginx resolver, utilised in Juniper’s NorthStar Controller product, and if exploited could allow for an unauthenticated, remote attacker that can forge UDP packets from the DNS server to again bring about a one-byte memory overwrite. This, in accordance to the corporation, could consequence in crashing the course of action or arbitrary code execution. 

Upgrading nginx from 1.18. to 1.20.1 fastened this concern.

In addition to the four important protection updates, Juniper also this 7 days issued 24 that it deemed “large severity” for products and solutions which include Junos OS, Secure Analytics, Id Administration Services, Paragon Active Assurance and Contrail Networking item lines. The Junos OS bug, for occasion, can be abused by a logged-in minimal-degree user to achieve total control of the technique, we observe (CVE-2022-22221). ®


Supply link