Your review has been sent successfully

Juniper Update

2884
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

29 April, 2020

● High

2020-1185

All

Description:

Juniper has released security update to address a vulnerability in the following product:

  • Junos OS
    • 12.3
    • 12.3X48
    • 14.1X53
    • 15.1
    • 15.1X49
    • 17.2
    • 17.3
    • 17.4
    • 18.1
    • 18.2
    • 18.3
    • 18.4
    • 19.1
    • 19.2
    • 19.3
    • 19.4
    • 20.1

Threats:

  • If HTTP/HTTPS services are disabled, there is no impact from this vulnerability.
  • If HTTP/HTTPS services are enabled and J-Web is not in use, an attacker may be able to inject commands into the httpd.log or read the configuration file.
  • If J-Web is enabled, the attacker could gain the same level of access of anyone actively logged into J-Web. If an administrator is logged in, the attacker could gain administrator access to J-Web.

Best practice and Recommendations:

The CERT team encourages users to review Juniper security advisory and apply the necessary updates:

It is highly recommended to disable HTTP/HTTPS service and DVPN or allowing HTTP service only on from trusted hosts or networks:

Last updated at 29 April, 2020

Rate the content

rate-icon
up icon