iTnews Asia
  • Home
  • News
  • Security

Juniper patches multiple router bugs

Juniper patches multiple router bugs

Web interface subject to RCE.

By Richard Chirgwin on Jan 15, 2024 11:28AM

Juniper Networks has issued its first three security updates for 2024, including a critical bug in its J-Web network management interface.

The company said it is unaware of any exploits of the vulnerabilities.

The J-Web out-of-bounds write bug, CVE-2024-21591 (CVSS score 9.8), affects Junos OS SRX Series and EX Series.

An unspecified “insecure function” in the software allows an attacker to “overwrite arbitrary memory”, giving a remote attacker remote code execution (RCE), denial-of-service, and root privileges on the affected device.

It affects eight versions of Junos OS, with patches available.

The company has also fixed two lower-rated BGP bugs in its Junos OS and Junos OS Evolved software.

CVE-2024-21611 (CVSS score 7.5) affects Junos OS 21.4, 22.1 and 22.2; and Junos OS Evolved 21.4-EVO, 22.1-EVO, and 22.2-EVO.

The advisory explained this is a “missing release of memory after effective lifetime” vulnerability in the Routing Protocol Daemon (rpd) which “allows an unauthenticated, network-based attacker to cause a denial of service (DoS).”

If there’s route churn in Juniper’s flow monitoring, jflow, causing BGP next hops to be updated, a “slow memory leak” will eventually crash and restart the rpd.

There’s also CVE-2024-21596 (CVSS score 5.3), which affects all versions of Junos OS and Junos OS Evolved, a heap-based buffer overflow in the rpd.

“If an attacker sends a specific BGP UPDATE message to the device, this will cause a memory overwrite and therefore an RPD crash and restart in the backup Routing Engine (RE),” the advisory stated.

An attacker can continue sending attack packets to cause a sustained DoS.

Juniper is subject to a $US14 billion (S$19 billion) takeover bid from HPE.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
juniper networks security

Related Articles

  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
  • How can we bolster our resilience against AI-enabled e-mail attacks?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.