Your review has been sent successfully

Juniper Networks Updates

1884
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

9 April, 2020

● High

2020-1122

All

Description:

Juniper Networks has released security updates to address multiple vulnerabilities in the following products:

  • Juniper Networks Junos OS
    • 12.3 versions prior to 12.3R12-S15;
    • 12.3X48 versions prior to 12.3X48-D95;
    • 14.1X50 versions prior to 14.1X50-D145;
    • 14.1X53 versions prior to 14.1X53-D47;
    • 15.1 versions prior to 15.1R2;
    • 15.1X49 versions prior to 15.1X49-D170;
    • 15.1X53 versions prior to 15.1X53-D67.
  • Juniper Networks Junos OS on MX Series with MPC10E or MPC11E and PTX10001:
    • 19.2 versions prior to 19.2R1-S4, 19.2R2;
    • 19.3 versions prior to 19.3R2-S2, 19.3R3;
    • 19.4 versions prior to 19.4R1-S1, 19.4R2.
  • Juniper Networks Junos OS Evolved on on QFX5220, and PTX10003 series:
    • 19.2-EVO versions;
    • 19.3-EVO versions
    • 19.4-EVO versions prior to 19.4R2-EVO.
  • Juniper Networks Junos OS on SRX Series:
    • 12.3X48 versions prior to 12.3X48-D100;
    • 15.1X49 versions prior to 15.1X49-D210;
    • 17.3 versions prior to 17.3R2-S5, 17.3R3-S8;
    • 17.4 versions prior to 17.4R2-S9, 17.4R3-S1
    • 18.1 versions prior to 18.1R3-S10;
    • 18.2 versions prior to 18.2R2-S7, 18.2R3-S3;
    • 18.3 versions prior to 18.3R1-S7, 18.3R3-S2;
    • 18.4 versions prior to 18.4R1-S6, 18.4R2-S4, 18.4R3-S1;
    • 19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3;
    • 19.2 versions prior to 19.2R1-S3, 19.2R2;
    • 19.3 versions prior to 19.3R2-S1, 19.3R3;
    • 19.4 versions prior to 19.4R1-S1, 19.4R2.
  • Juniper Networks Junos OS:
    • 17.4 versions prior to 17.4R2-S9, 17.4R3 on MX Series;
    • 18.1 versions prior to 18.1R3-S9 on MX Series;
    • 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on MX Series
    • 18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420,
    • 18.2X75-D60 on MX Series;
    • 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3 on MX Series;
    • 18.4 versions prior to 18.4R1-S5, 18.4R2-S2, 18.4R3 on MX Series;
    • 19.1 versions prior to 19.1R1-S4, 19.1R2 on MX Series;
    • 19.2 versions prior to 19.2R1-S3, 19.2R2 on MX Series.
  • Juniper Networks Junos OS
    • 16.1 versions prior to 16.1R7-S6;
    • 16.2 versions prior to 16.2R2-S11;
    • 17.1 versions prior to 17.1R2-S11, 17.1R3-S1
    • 17.2 versions prior to 17.2R1-S9, 17.2R3-S3;
    • 17.2 version 17.2R2 and later versions
    • 17.2X75 versions prior to 17.2X75-D105, 17.2X75-D110;
    • 17.3 versions prior to 17.3R2-S5, 17.3R3-S6;
    • 17.4 versions prior to 17.4R2-S7, 17.4R3;
    • 18.1 versions prior to 18.1R3-S8;
    • 18.2 versions prior to 18.2R3-S3;
    • 18.2X75 versions prior to 18.2X75-D410, 18.2X75-D420, 18.2X75-D50, 18.2X75-D60;
    • 18.3 versions prior to 18.3R1-S5, 18.3R2-S2, 18.3R3;
    • 18.4 versions prior to 18.4R2-S2, 18.4R3;
    • 19.1 versions prior to 19.1R1-S2, 19.1R2;
    • 19.2 versions prior to 19.2R1-S4, 19.2R2.
  • Juniper Networks Junos OS:
    • 14.1X53 versions prior to 14.1X53-D53 on EX4300;
    • 15.1 versions prior to 15.1R7-S6 on EX4300;
    • 15.1X49 versions prior to 15.1X49-D200, 15.1X49-D210 on EX4300;
    • 16.1 versions prior to 16.1R7-S7 on EX4300;
    • 17.1 versions prior to 17.1R2-S11, 17.1R3-S2 on EX4300;
    • 17.2 versions prior to 17.2R3-S3 on EX4300;
    • 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on EX4300;
    • 17.4 versions prior to 17.4R2-S9, 17.4R3 on EX4300;
    • 18.1 versions prior to 18.1R3-S8 on EX4300;
    • 18.2 versions prior to 18.2R3-S2 on EX4300;
    • 18.3 versions prior to 18.3R2-S3, 18.3R3, 18.3R3-S1 on EX4300;
    • 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300;
    • 19.1 versions prior to 19.1R1-S4, 19.1R2 on EX4300;
    • 19.2 versions prior to 19.2R1-S4, 19.2R2 on EX4300;
    • 19.3 versions prior to 19.3R1-S1, 19.3R2 on EX4300.
  • Juniper Networks Junos OS:
    • 18.1 versions prior to 18.1R3 on vMX and MX150;
    • 18.2 versions prior to 18.2R3 on vMX and MX150;
    • 18.2X75 versions prior to 18.2X75-D60 on vMX and MX150
    • 18.3 versions prior to 18.3R3 on vMX and MX150;
    • 18.4 versions prior to 18.4R2 on vMX and MX150;
    • 19.1 versions prior to 19.1R2 on vMX and MX150
  • Juniper Secure Analytics (JSA)
    • 7.3.2 , 7.3.3.
  • Juniper Networks Junos OS
    • 12.3 versions prior to 12.3R12-S14
    • 12.3X48 versions prior to 12.3X48-D86, 12.3X48-D90;
    • 14.1X53 versions prior to 14.1X53-D51;
    • 15.1 versions prior to 15.1R7-S6;
    • 15.1X49 versions prior to 15.1X49-D181, 15.1X49-D190;
    • 15.1X53 versions prior to 15.1X53-D592;
    • 16.1 versions prior to 16.1R4-S13, 16.1R7-S6;
    • 16.2 versions prior to 16.2R2-S10
    • 17.1 versions prior to 17.1R2-S11, 17.1R3-S1;
    • 17.2 versions prior to 17.2R1-S9, 17.2R3-S3;
    • 17.3 versions prior to 17.3R3-S6;
    • 17.4 versions prior to 17.4R2-S6, 17.4R3;
    • 18.1 versions prior to 18.1R3-S7;
    • 18.2 versions prior to 18.2R2-S5, 18.2R3-S1;
    • 18.2 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D420, 18.2X75-D60,
    • 18.2X75-D411;
    • 18.3 versions prior to 18.3R1-S5, 18.3R2-S1, 18.3R3;
    • 18.4 versions prior to 18.4R1-S4, 18.4R2-S1, 18.4R3;
    • 19.1 versions prior to 19.1R1-S2, 19.1R2;
    • 19.2 versions prior to 19.2R1-S1, 19.2R2.
  • Juniper Networks NFX Series Network Services Platform.
    • Affected platforms: NFX250 Series.
  • Junos OS 17.4, 18.1, 18.2, 18.2X75, 18.3.
    • Affected platforms: PTX1000 and PTX10000 Series, QFX10000 Series.
  • Junos OS 12.3X48.
    • Affected platforms: High-End SRX Series.
  • Juniper Networks Junos OS
    • 12.1X46 versions prior to 12.1X46-D86 on SRX Branch Series, vSRX Series;
    • 12.3X48 versions prior to 12.3X48-D80 on SRX Branch Series, vSRX Series;
    • 15.1X49 versions prior to 15.1X49-D180 on SRX Branch Series, vSRX Series;
    • 17.3 versions prior to 17.3R3-S7 on SRX Branch Series, vSRX Series
    • 17.4 versions prior to 17.4R3 on SRX Branch Series, vSRX Series
    • 18.1 versions prior to 18.1R3-S9 on SRX Branch Series, vSRX Series
    • 18.2 versions prior to 18.2R3 on SRX Branch Series, vSRX Series
    • 18.3 versions prior to 18.3R2 on SRX Branch Series, vSRX Series;
    • 18.4 versions prior to 18.4R1-S6, 18.4R2 on SRX Branch Series, vSRX Series
    • 19.1 versions prior to 19.1R1 on SRX Branch Series, vSRX Series.
  • Junos OS 12.3,
    • 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2X75.
  • Junos OS
    • 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.2X75, 18.3, 18.4, 19.1, 19.2, 19.3. Affected platforms: vMX.
  • JATP.
    • Affected platforms: JATP Series, vJATP.
  • Junos OS
    • 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.3.
  • Junos OS Evolved

Threats:

An attacker could exploit these vulnerabilities by doing the following:

  • Man in the Middle (MitM) attack
  • Denial of Service (DoS) attack
  • Information exposure
  • Obtain sensitive information
  • Buffer overflow
  • Bypass security restrictions
  • Execute arbitrary code

Best practice and Recommendations:

The CERT team encourages users to apply the necessary update according to the links below:

  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11020&cat=SIRT_1&actp=LIS
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11019&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11018&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11012&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11012&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11008&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11008&cat=SIRT_1&actp=LIS
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11006&cat=SIRT_1&actp=LIS
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11007&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11010&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11013&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11003&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11016&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10997&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11000&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11014&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10994&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10996&cat=SIRT_1&actp=LIS
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10998&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10999&cat=SIRT_1&actp=LIST
  • https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11001&cat=SIRT_1&actp=LIST

Last updated at 9 April, 2020

Rate the content

rate-icon
up icon