Your review has been sent successfully

Juniper Updates

2339
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

14 January, 2021

● High

2021-2326

All

Description:

Juniper has released a security updates to address multiple vulnerabilities in the following products:

  • Juniper Networks Junos OS
    • all versions prior to 17.3R3-S11;
    • 17.4 versions prior to 17.4R2-S12, 17.4R3-S3;
    • 18.1 versions prior to 18.1R3-S11;
    • 18.2 versions prior to 18.2R3-S6;
    • 18.3 versions prior to 18.3R3-S4;
    • 18.4 versions prior to 18.4R2-S7, 18.4R3-S6;
    • 19.1 versions prior to 19.1R2-S2, 19.1R3-S4;
    • 19.2 versions prior to 19.2R1-S6, 19.2R3-S1;
    • 19.3 versions prior to 19.3R3-S1;
    • 19.4 versions prior to 19.4R2-S2, 19.4R3-S1;
    • 20.1 versions prior to 20.1R1-S4, 20.1R2;
    • 20.2 versions prior to 20.2R2.
    • all versions prior to 17.3R3-S10;
    • 17.4 versions prior to 17.4R2-S12, 17.4R3-S3;
    • 18.1 versions prior to 18.1R3-S11;
    • 18.2 versions prior to 18.2R2-S8, 18.2R3-S6;
    • 18.3 versions prior to 18.3R3-S4;
    • 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S6;
    • 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3;
    • 19.2 versions prior to 19.2R3-S1;
    • 19.3 versions prior to 19.3R2-S5, 19.3R3-S1;
    • 19.4 versions prior to 19.4R2-S2, 19.4R3-S1;
    • 20.1 versions prior to 20.1R2;
    • 20.2 versions prior to 20.2R1-S2, 20.2R2;
    • 20.3 versions prior to 20.3R1-S1, 20.3R2.
    • 17.3, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2, 19.3, 19.4, 20.1, 20.2
    • 14.1X53 versions prior to 14.1X53-D54;
    • 15.1X49 versions prior to 15.1X49-D240 ;
    • 15.1X53 versions prior to 15.1X53-D593;
    • 16.1 versions prior to 16.1R7-S8;
    • 17.2 versions prior to 17.2R3-S4;
    • 17.3 versions prior to 17.3R3-S8;
    • 17.4 versions prior to 17.4R2-S11, 17.4R3-S2;
    • 18.1 versions prior to 18.1R3-S10 ;
    • 18.2 versions prior to 18.2R2-S7, 18.2R3-S3;
    • 18.3 versions prior to 18.3R2-S4, 18.3R3-S2;
    • 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2;
    • 19.1 versions prior to 19.1R1-S5, 19.1R2-S2, 19.1R3;
    • 19.2 versions prior to 19.2R1-S5, 19.2R2;
    • 19.3 versions prior to 19.3R2-S3, 19.3R3;
    • 19.4 versions prior to 19.4R1-S2, 19.4R2.
  • Contrail Insights
  • Juniper Networks Junos OS on QFX Series
    • all versions prior to 17.3R3-S10;
    • 17.4 versions prior to 17.4R2-S12, 17.4R3-S3;
    • 18.1 versions prior to 18.1R3-S11;
    • 18.2 versions prior to 18.2R3-S6;
    • 18.3 versions prior to 18.3R3-S4;
    • 18.4 versions prior to 18.4R2-S5, 18.4R3-S5;
    • 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3;
    • 19.2 versions prior to 19.2R1-S5, 19.2R3-S1;
    • 19.3 versions prior to 19.3R2-S5, 19.3R3;
    • 19.4 versions prior to 19.4R2-S2, 19.4R3;
    • 20.1 versions prior to 20.1R2;
    • 20.2 versions prior to 20.2R1-S2, 20.2R2.
    • 17.4R3 versions prior to 17.4R3-S3;
    • 18.1R3 versions between 18.1R3-S6 and 18.1R3-S11;
    • 18.2R3 versions prior to 18.2R3-S6;
    • 18.3R3 versions prior to 18.3R3-S4;
    • 18.4R2 versions prior to 18.4R2-S5;
    • 18.4R3 versions prior to 18.4R3-S6;
    • 19.1 versions between 19.1R2 and 19.1R3-S3;
    • 19.2 versions prior to 19.2R3-S1;
    • 19.3 versions prior to 19.3R2-S5, 19.3R3;
    • 19.4 versions prior to 19.4R2-S2, 19.4R3;
    • 20.1 versions prior to 20.1R2;
    • 20.2 versions prior to 20.2R1-S2, 20.2R2.
  • Junos Space

Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Escalation of privilege
  • Execute arbitrary code
  • Sensitive information disclosure
  • Denial of service attack (DoS)

Best practice and Recommendations:

The CERT team encourages users to review Juniper security advisory and apply the necessary updates:

Last updated at 14 January, 2021

Rate the content

rate-icon
up icon