CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

New Juniper Junos OS Flaws Expose Devices to Remote Attacks

admin by admin
August 21, 2023
in Information Security


Aug 19, 2023THNNetwork Security / Vulnerability

Networking hardware company Juniper Networks has released an “out-of-cycle” security update to address multiple flaws in the J-Web component of Junos OS that could be combined to achieve remote code execution on susceptible installations.

The four vulnerabilities have a cumulative CVSS rating of 9.8, making them Critical in severity. They affect all versions of Junos OS on SRX and EX Series.

“By chaining exploitation of these vulnerabilities, an unauthenticated, network-based attacker may be able to remotely execute code on the devices,” the company said in an advisory released on August 17, 2023.

Cybersecurity

The J-Web interface allows users to configure, manage, and monitor Junos OS devices. A brief description of the flaws is as follows –

  • CVE-2023-36844 and CVE-2023-36845 (CVSS scores: 5.3) – Two PHP external variable modification vulnerabilities in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to control certain, important environments variables.
  • CVE-2023-36846 and CVE-2023-36847 (CVSS scores: 5.3) – Two missing authentications for critical function vulnerabilities in Juniper Networks Junos OS on EX Series and SRX Series allow an unauthenticated, network-based attacker to cause limited impact to the file system integrity.

A threat actor could send a specially crafted request to modify certain PHP environment variables or upload arbitrary files via J-Web sans any authentication to successfully exploit the aforementioned issues.

Cybersecurity

The vulnerabilities have been addressed in the below versions –

  • EX Series – Junos OS versions 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, and 23.2R1
  • SRX Series – Junos OS versions 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, and 23.2R1

Users are recommended to apply the necessary fixes to mitigate potential remote code execution threats. As a workaround, Juniper Networks is suggesting that users either disable J-Web or limit access to only trusted hosts.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams

Next Post

How Data Governance Leaders Can Identify Quick Wins

Related Posts

Information Security

FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies

by admin
October 1, 2023
Information Security

How AWS threat intelligence deters threat actors

by admin
October 1, 2023
Information Security

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks

by admin
September 30, 2023
Information Security

Manage AWS Security Hub using CloudFormation

by admin
September 30, 2023
Information Security

Is that how it works? Hacking and scamming in popular TV shows

by admin
September 30, 2023
Next Post

How Data Governance Leaders Can Identify Quick Wins

Recommended

The Breakthrough Innovation Best Practices ~ Future of CIO

October 1, 2023

FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies

October 1, 2023

How AWS threat intelligence deters threat actors

October 1, 2023

InnovationBreakthrough Chapter V Innovation Risk Management ~ Future of CIO

September 30, 2023

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks

September 30, 2023

Manage AWS Security Hub using CloudFormation

September 30, 2023

© CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 CIO News Hubb All rights reserved.