iTnews Asia
  • Home
  • News
  • Security

Juniper patches multiple router bugs

Juniper patches multiple router bugs

Web interface subject to RCE.

By Richard Chirgwin on Jan 15, 2024 11:28AM

Juniper Networks has issued its first three security updates for 2024, including a critical bug in its J-Web network management interface.

The company said it is unaware of any exploits of the vulnerabilities.

The J-Web out-of-bounds write bug, CVE-2024-21591 (CVSS score 9.8), affects Junos OS SRX Series and EX Series.

An unspecified “insecure function” in the software allows an attacker to “overwrite arbitrary memory”, giving a remote attacker remote code execution (RCE), denial-of-service, and root privileges on the affected device.

It affects eight versions of Junos OS, with patches available.

The company has also fixed two lower-rated BGP bugs in its Junos OS and Junos OS Evolved software.

CVE-2024-21611 (CVSS score 7.5) affects Junos OS 21.4, 22.1 and 22.2; and Junos OS Evolved 21.4-EVO, 22.1-EVO, and 22.2-EVO.

The advisory explained this is a “missing release of memory after effective lifetime” vulnerability in the Routing Protocol Daemon (rpd) which “allows an unauthenticated, network-based attacker to cause a denial of service (DoS).”

If there’s route churn in Juniper’s flow monitoring, jflow, causing BGP next hops to be updated, a “slow memory leak” will eventually crash and restart the rpd.

There’s also CVE-2024-21596 (CVSS score 5.3), which affects all versions of Junos OS and Junos OS Evolved, a heap-based buffer overflow in the rpd.

“If an attacker sends a specific BGP UPDATE message to the device, this will cause a memory overwrite and therefore an RPD crash and restart in the backup Routing Engine (RE),” the advisory stated.

An attacker can continue sending attack packets to cause a sustained DoS.

Juniper is subject to a $US14 billion (S$19 billion) takeover bid from HPE.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
juniper networks security

Related Articles

  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
  • Cybersecurity threats CISOs should be most worried about in 2025
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.