Juniper Junos OS Multiple Vulnerabilities
Release Date:
12 Jan 2024
4810
Views
RISK: Medium Risk
TYPE: Operating Systems - Networks OS
Multiple vulnerabilities were identified in Juniper Junos OS. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, security restriction bypass and data manipulation on the targeted system.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Security Restriction Bypass
- Data Manipulation
System / Technologies affected
Juniper Networks Junos OS
- 21.1 versions earlier than 21.1R3-S4
- 21.1 versions earlier than 21.1R3-S5
- 21.2 versions earlier than 21.2R3
- 21.2 versions earlier than 21.2R3-S3
- 21.2 versions earlier than 21.2R3-S4
- 21.2 versions earlier than 21.2R3-S5
- 21.2 versions earlier than 21.2R3-S6 on SRX Series
- 21.2 versions earlier than 21.2R3-S6
- 21.2 versions earlier than 21.2R3-S7
- 21.2R1-EVO and later versions
- 21.3 versions earlier than 21.3R2-S1, 21.3R3
- 21.3 versions earlier than 21.3R3-S3
- 21.3 versions earlier than 21.3R3-S4
- 21.3 versions earlier than 21.3R3-S5 on SRX Series
- 21.3 versions earlier than 21.3R3-S5
- 21.3 versions earlier than 21.3R3-S5-EVO
- 21.4 versions earlier than 21.4R2
- 21.4 versions earlier than 21.4R3
- 21.4 versions earlier than 21.4R3-EVO
- 21.4 versions earlier than 21.4R3-S3
- 21.4 versions earlier than 21.4R3-S4
- 21.4 versions earlier than 21.4R3-S5 on SRX Series
- 21.4 versions earlier than 21.4R3-S5
- 21.4 versions earlier than 21.4R3-S5-EVO
- 21.4-EVO versions earlier than 21.4R3-EVO
- 21.4-EVO versions earlier than 21.4R3-S5-EVO
- 21.4-EVO versions earlier than 21.4R3-S6-EVO
- 21.4R3 versions earlier than 21.4R3-S4
- 22.1 versions earlier than 22.1R2
- 22.1 versions earlier than 22.1R2-S2, 22.1R3
- 22.1 versions earlier than 22.1R3
- 22.1 versions earlier than 22.1R3-EVO
- 22.1 versions earlier than 22.1R3-S1
- 22.1 versions earlier than 22.1R3-S2
- 22.1 versions earlier than 22.1R3-S3 on SRX Series
- 22.1 versions earlier than 22.1R3-S3
- 22.1 versions earlier than 22.1R3-S4
- 22.1 versions earlier than 22.1R3-S4-EVO
- 22.1-EVO versions earlier than 22.1R3-EVO
- 22.1-EVO versions earlier than 22.1R3-S2-EVO
- 22.1-EVO versions earlier than 22.1R3-S4-EVO
- 22.1-EVO versions earlier than 22.1R3-S5-EVO
- 22.1R3 versions earlier than 22.1R3-S3
- 22.2 versions earlier than 22.2R2
- 22.2 versions earlier than 22.2R2-S1, 22.2R3
- 22.2 versions earlier than 22.2R2-S2, 22.2R3
- 22.2 versions earlier than 22.2R2-S2-EVO, 22.2R3-EVO
- 22.2 versions earlier than 22.2R3
- 22.2 versions earlier than 22.2R3-EVO
- 22.2 versions earlier than 22.2R3-S1
- 22.2 versions earlier than 22.2R3-S2
- 22.2 versions earlier than 22.2R3-S3 on SRX Series
- 22.2 versions earlier than 22.2R3-S3
- 22.2 versions earlier than 22.2R3-S3-EVO
- 22.2-EVO versions earlier than 22.2R2-S1-EVO, 22.2R3-EVO;
- 22.2-EVO versions earlier than 22.2R3-EVO
- 22.2-EVO versions earlier than 22.2R3-S2-EVO
- 22.2R2 versions earlier than 22.2R3-S1
- 22.3 versions earlier than 22.3R2, 22.3R3
- 22.3 versions earlier than 22.3R2
- 22.3 versions earlier than 22.3R2-EVO, 22.3R3-EVO
- 22.3 versions earlier than 22.3R2-S1, 22.3R3
- 22.3 versions earlier than 22.3R2-S2, 22.3R3
- 22.3 versions earlier than 22.3R3-EVO
- 22.3 versions earlier than 22.3R3-S1 on SRX Series
- 22.3 versions earlier than 22.3R3-S1
- 22.3 versions earlier than 22.3R3-S1-EVO
- 22.3 versions earlier than 22.3R3-S2
- 22.3-EVO versions earlier than 22.3R2-EVO
- 22.3-EVO versions later than 22.3R1-EVO
- 22.4 versions earlier than 22.4R1-S2, 22.4R2
- 22.4 versions earlier than 22.4R1-S2, 22.4R2-S2, 22.4R3
- 22.4 versions earlier than 22.4R2
- 22.4 versions earlier than 22.4R2-EVO, 22.4R3-EVO
- 22.4 versions earlier than 22.4R2-S1, 22.4R3
- 22.4 versions earlier than 22.4R2-S2, 22.4R3 on SRX Series
- 22.4 versions earlier than 22.4R2-S2, 22.4R3
- 22.4 versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO
- 22.4-EVO versions earlier than 22.4R2-EVO
- 22.4-EVO versions earlier than 22.4R2-S2-EVO, 22.4R3-EVO
- 23.1 versions earlier than 23.1R2
- 23.2 versions earlier than 23.2R1-S1, 23.2R2
- 23.2 versions earlier than 23.2R1-S1-EVO, 23.2R2-EVO
- 23.2 versions earlier than 23.2R1-S2, 23.2R2
- 23.2 versions earlier than 23.2R2
- 23.2-EVO versions earlier than 23.2R1-S2-EVO, 23.2R2-EVO
- All versions earlier than 20.4R3-S3
- All versions earlier than 20.4R3-S6
- All versions earlier than 20.4R3-S7
- All versions earlier than 20.4R3-S7-EVO
- All versions earlier than 20.4R3-S8 on SRX Series
- All versions earlier than 20.4R3-S8
- All versions earlier than 20.4R3-S9
- All versions earlier than 21.2R3-S3
- All versions earlier than 21.2R3-S6
- All versions earlier than 21.2R3-S7-EVO
- All versions earlier than 21.3R3-S5-EVO
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699
Vulnerability Identifier
- CVE-2023-36842
- CVE-2024-21585
- CVE-2024-21587
- CVE-2024-21591
- CVE-2024-21594
- CVE-2024-21595
- CVE-2024-21596
- CVE-2024-21597
- CVE-2024-21599
- CVE-2024-21600
- CVE-2024-21601
- CVE-2024-21602
- CVE-2024-21603
- CVE-2024-21606
- CVE-2024-21607
- CVE-2024-21611
- CVE-2024-21612
- CVE-2024-21613
- CVE-2024-21614
- CVE-2024-21616
- CVE-2024-21617
- CVE-2022-21699
- CVE-2024-21604
Source
Related Link
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7100-32C-and-ACX7100-48L-Traffic-stops-when-a-specific-IPv4-UDP-packet-is-received-by-the-RE-CVE-2024-21602
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-Specific-TCP-traffic-causes-OFP-core-and-restart-of-RE-CVE-2024-21612
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-link-flap-causes-patroot-memory-leak-which-leads-to-rpd-crash-CVE-2024-21613
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-BGP-UPDATE-message-will-cause-a-crash-in-the-backup-Routing-Engine-CVE-2024-21596
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-specific-query-via-DREND-causes-rpd-crash-CVE-2024-21614
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-jflow-scenario-continuous-route-churn-will-cause-a-memory-leak-and-eventually-an-rpd-crash-CVE-2024-21611
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-rpd-process-crash-due-to-BGP-flap-on-NSR-enabled-devices-CVE-2024-21585
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-BGP-flap-on-NSR-enabled-devices-causes-memory-leak-CVE-2024-21617
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-EX4100-EX4400-EX4600-and-QFX5000-Series-A-high-rate-of-specific-ICMP-traffic-will-cause-the-PFE-to-hang-CVE-2024-21595
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-Series-If-the-tcp-reset-option-used-in-an-IPv6-filter-matched-packets-are-accepted-instead-of-rejected-CVE-2024-21607
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-Gathering-statistics-in-a-scaled-SCU-DCU-configuration-will-lead-to-a-device-crash-CVE-2024-21603
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-In-an-AF-scenario-traffic-can-bypass-configured-lo0-firewall-filters-CVE-2024-21597
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-MX-Series-MPC3E-memory-leak-with-PTP-configuration-CVE-2024-21599
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Memory-leak-in-bbe-smgd-process-if-BFD-liveness-detection-for-DHCP-subscribers-is-enabled-CVE-2024-21587
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-PTX-Series-In-an-FTI-scenario-MPLS-packets-hitting-reject-next-hop-will-cause-a-host-path-wedge-condition-CVE-2024-21600
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Processing-of-a-specific-SIP-packet-causes-NAT-IP-allocation-to-fail-CVE-2024-21616
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-5000-Series-Repeated-execution-of-a-specific-CLI-command-causes-a-flowd-crash-CVE-2024-21594
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-Due-to-an-error-in-processing-TCP-events-flowd-will-crash-CVE-2024-21601
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-SRX-Series-flowd-will-crash-when-tcp-encap-is-enabled-and-specific-packets-are-received-CVE-2024-21606
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-jdhcpd-will-hang-on-receiving-a-specific-DHCP-packet-CVE-2023-36842
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-A-high-rate-of-specific-traffic-will-cause-a-complete-system-outage-CVE-2024-21604
- https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Junos-OS-Evolved-IPython-privilege-escalation-vulnerability-CVE-2022-21699
Related Tags
Share with