Critical : RCE in Juniper Firewalls & Switches

Juniper Networks has recently taken significant steps to address a critical remote code execution (RCE) vulnerability affecting its SRX Series firewalls and EX Series switches. Designated as CVE-2024-21591, this vulnerability has been assigned a high severity rating of 9.8 on the Common Vulnerability Scoring System (CVSS). 

RCE Juniper Firewall and Switches

In response to the potential risks associated with this security flaw, Juniper Networks, a major player in the networking equipment industry, has released updates aimed at mitigating the vulnerability.

The identified vulnerability specifically resides in the J-Web component of Juniper Networks Junos OS, impacting SRX Series and EX Series devices. This flaw exposes an out-of-bounds write vulnerability, creating a pathway for an unauthenticated, network-based attacker to exploit the system. The potential consequences of such an exploitation include a Denial-of-Service (DoS) scenario or, more critically, Remote Code Execution (RCE), allowing the attacker to gain root privileges on the compromised device. According to Juniper Networks’ advisory, the vulnerability arises from the use of an insecure function, providing a malicious actor with the ability to overwrite arbitrary memory.

It’s worth noting that Juniper Networks, currently in the process of being acquired by Hewlett Packard Enterprise (HPE) for a substantial $14 billion, has not let this impending change in ownership hinder its commitment to addressing security concerns promptly.

The impacted versions of Junos OS encompass those predating the following fixed releases: 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S2, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and subsequent versions. Specifically, this includes versions earlier than 20.4R3-S9 for Junos OS, earlier than 21.2R3-S7 for Junos OS 21.2, earlier than 21.3R3-S5 for Junos OS 21.3, earlier than 21.4R3-S5 for Junos OS 21.4, earlier than 22.1R3-S4 for Junos OS 22.1, earlier than 22.2R3-S3 for Junos OS 22.2, earlier than 22.3R3-S2 for Junos OS 22.3, earlier than 22.4R2-S2 for Junos OS 22.4, and earlier than 22.4R3 for Junos OS 22.4.

Given the severity of the situation, Juniper Networks recommends that users implement temporary measures until the fixes can be deployed. These interim solutions include disabling J-Web or, alternatively, restricting access to only trusted hosts. These measures are designed to minimize the risk of potential exploitation until the comprehensive updates can be applied.

In addition to addressing the critical RCE vulnerability, Juniper Networks has also successfully resolved another high-severity bug identified as CVE-2024-21611. This vulnerability, with a CVSS score of 7.5, impacts Junos OS and Junos OS Evolved. Like the previously mentioned flaw, this bug could be exploited by an unauthenticated, network-based attacker to induce a Denial-of-Service (DoS) condition.

While the security patches are crucial to fortifying systems against potential threats, there is notable evidence suggesting that these vulnerabilities have been actively exploited in the wild. This underscores the urgency for users to promptly apply the provided updates and adhere to the recommended temporary measures to protect their systems from potential compromise.

Furthermore, the disclosure highlights that Juniper Networks experienced multiple security shortcomings affecting its SRX firewalls and EX switches in the preceding year. Threat actors took advantage of these vulnerabilities, emphasizing the ongoing need for robust cybersecurity practices and a proactive stance against emerging threats.

In conclusion, Juniper Networks’ swift response to these vulnerabilities demonstrates the company’s commitment to ensuring the security and integrity of its products. Users are strongly urged to apply the provided updates promptly and adopt recommended mitigations to safeguard their networks against potential exploits. As the cybersecurity landscape continues to evolve, vigilance and proactive measures remain crucial to staying ahead of emerging threats.

1 thought on “Critical : RCE in Juniper Firewalls & Switches”

  1. Pingback: Unraveling the Complexity: New Insights on Cyber Attacks Targeting Denmark's Energy Sector -

Comments are closed.

Scroll to Top