Article Details

Scrape Timestamp (UTC): 2024-01-30 05:07:54.128

Source: https://thehackernews.com/2024/01/juniper-networks-releases-urgent-junos.html

Original Article Text

Click to Toggle View

Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws. Juniper Networks has released out-of-band updates to address high-severity flaws in SRX Series and EX Series that could be exploited by a threat actor to take control of susceptible systems. The vulnerabilities, tracked as CVE-2024-21619 and CVE-2024-21620, are rooted in the J-Web component and impact all versions of Junos OS. Two other shortcomings, CVE-2023-36846 and CVE-2023-36851, were previously disclosed by the company in August 2023. Cybersecurity firm watchTowr Labs has been credited with discovering and reporting the issues. The two vulnerabilities have been addressed in the following versions - As temporary mitigations until the fixes are deployed, the company is recommending that users disable J-Web or restrict access to only trusted hosts. It's worth noting that both CVE-2023-36846 and CVE-2023-36851 were added to the Known Exploited Vulnerabilities (KEV) catalog in November 2023 by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), based on evidence of active exploitation. Earlier this month, Juniper Networks also shipped fixes to contain a critical vulnerability in the same products (CVE-2024-21591, CVSS score: 9.8) that could enable an attacker to cause a denial-of-service (DoS) or remote code execution and obtain root privileges on the device. SaaS Security Masterclass: Insights from 493 Companies Watch this webinar to discover Critical SaaS Security Do's and Don'ts based on a study of 493 companies, offering real-world comparisons and benchmarks.

Daily Brief Summary

CYBERCRIME // Juniper Networks Patches High-Severity Vulnerabilities in Junos OS

Juniper Networks has issued out-of-band updates for high-severity vulnerabilities in its SRX and EX Series products.

The flaws, identified as CVE-2024-21619 and CVE-2024-21620, could allow attackers to gain control over affected systems.

Security firm watchTowr Labs identified and reported these critical issues.

Users are advised to either disable the J-Web component or restrict access to it as immediate mitigation steps.

The CVE-2023-36846 and CVE-2023-36851 vulnerabilities, disclosed in August and known to be exploited in the wild, are also covered in the KEV catalog by CISA.

Juniper Networks previously addressed another critical vulnerability (CVE-2024-21591) that potentially allowed DoS attacks and remote code execution.

A related SaaS Security Masterclass webinar provides insights into SaaS security practices based on the study of 493 companies.