CVE-2017-10620 – SRX Series: Antivirus updates are downloaded without verification
https://notcve.org/view.php?id=CVE-2017-10620
Juniper Networks Junos OS on SRX series devices do not verify the HTTPS server certificate before downloading anti-virus updates. This may allow a man-in-the-middle attacker to inject bogus signatures to cause service disruptions or make the device not detect certain types of attacks. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D55; 15.1X49 prior to 15.1X49-D110; Juniper Networks Junos OS en dispositivos de la serie SRX no verifica el certificado del servidor HTTPS antes de descargar actualizaciones de antivirus. Esto puede permitir que un atacante Man-in-the-Middle (MitM) inyecte firmas falsas para causar disrupciones de servicio o hacer que el dispositivo no detecte ciertos tipos de ataques. Las distribuciones afectadas Junos OS son: 12.1X46 anteriores a 12.1X46-D71; 12.3X48 anteriores a 12.3X48-D55; 15.1X49 anteriores a 15.1X49-D110. • https://kb.juniper.net/JSA10822 • CWE-295: Improper Certificate Validation •
CVE-2017-10618 – Junos: RPD core due to BGP UPDATE with malformed optional transitive attributes
https://notcve.org/view.php?id=CVE-2017-10618
When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. Devices with BGP enabled that do not have 'bgp-error-tolerance' configured are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS 13.3 prior to 13.3R10-S2; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X50 prior to 14.1X50-D185; 14.1X53 prior to 14.1X53-D45, 14.1X53-D50; 14.2 prior to 14.2R7-S7, 14.2R8; 15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D64, 15.1X53-D70; 16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5; 16.2 prior to 16.2R1-S5, 16.2R2; 17.1 prior to 17.1R1-S3, 17.1R2; 17.2 prior to 17.2R1-S2, 17.2R2; 17.2X75 prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue. Cuando 'bgp-error-tolerance' feature #xe2;#x80;", que está diseñado para ayudar a mitigar reinicios de sesiones remotas de atributos de ruta mal formados #xe2;#x80, está habilitado, un BGP UPDATE que contenga una serie de atributos transitivos especialmente manipulados podría provocar que el proceso de enrutamiento de RPD se cierre de manera inesperada y se reinicie. • https://kb.juniper.net/JSA10820 https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.html https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.html •
CVE-2017-10619 – Junos: SRX cluster denial of service vulnerability in flowd due to multicast packets
https://notcve.org/view.php?id=CVE-2017-10619
When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled by default and is only supported in high-end SRX platforms. Affected releases are Juniper Networks Junos OS 12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80 on SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800. Cuando Express Path (antes conocido como "service offloading") se configura en Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 en modo de configuración de clústeres en alta disponibilidad, algunos paquetes multicast podrían causar que el proceso flowd se cierre de manera inesperada, deteniendo o interrumpiendo el trafico que atraviesa el dispositivo y desencadenando un fail-over RG1+ (data-plane) en el nodo secundario. • https://kb.juniper.net/JSA10821 •
CVE-2016-4924 – vMX: Information leak vulnerability
https://notcve.org/view.php?id=CVE-2016-4924
An incorrect permissions vulnerability in Juniper Networks Junos OS on vMX may allow local unprivileged users on a host system read access to vMX or vPFE images and obtain sensitive information contained in them such as private cryptographic keys. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 15.1 prior to 15.1F5; 14.1 prior to 14.1R8 Una vulnerabilidad de permisos incorrectos en Juniper Networks Junos OS en vMX podría permitir que usuarios locales sin privilegios en un sistema host tengan acceso de lectura a imágenes vMX o vPFE y obtengan información sensible contenida en ellas como claves criptográficas privadas. • http://www.securityfocus.com/bid/93531 https://kb.juniper.net/JSA10766 • CWE-275: Permission Issues •
CVE-2016-4921 – Junos: IPv6 denial of service vulnerability due to resource exhaustion (CVE-2016-4921)
https://notcve.org/view.php?id=CVE-2016-4921
By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. • http://www.securityfocus.com/bid/93532 http://www.securitytracker.com/id/1037014 https://kb.juniper.net/JSA10762 • CWE-399: Resource Management Errors •