Juniper Updates
2540Warning Date
Severity Level
Warning Number
Target Sector
14 October, 2021
● Critical
2021-3683
All
Description:
Juniper has released a security update to address multiple vulnerabilities in the following products, the most important ones:
- Windows versions earlier than 20.4.12.20
- macOS versions earlier than 21.3.4.52, iOS versions earlier than 21.2.2.1
- Android versions earlier than 21.1.5.01.CTPView:
- 9.1 versions prior to 9.1R3
- 7.3 versions prior to 7.3R7
- Junos OS Evolved:
- All versions prior to 20.3R2-S1-EVO
- All versions prior to 20.4R3-S1-EVO;
- All versions of 21.1-EVO and 21.2-EVO.
- Juniper Networks Junos OS
- 20.4 versions prior to 20.4R2-EVO;
- 21.1 versions prior to 21.1R2-EVO.
- 18.4 versions prior to 18.4R1-S8, 18.4R2-S8, 18.4R3-S8;
- 19.1 versions prior to 19.1R2-S3, 19.1R3-S5
- 19.2 versions prior to 19.2R1-S7, 19.2R3-S2
- 19.3 versions prior to 19.3R2-S6, 19.3R3-S2;
- 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3;
- 20.1 versions prior to 20.1R2-S2, 20.1R3;
- 20.2 versions prior to 20.2R2-S3, 20.2R3;
- 20.3 versions prior to 20.3R2-S1, 20.3R3;
- 20.4 versions prior to 20.4R2.
- 19.3R3-S2;
- 19.4R3-S3;
- 20.2 versions 20.2R2-S3 and later, prior to 20.2R3-S2;
- 20.3 versions 20.3R2 and later, prior to 20.3R3;
- 20.4 versions 20.4R2 and later, prior to 20.4R3;
- 21.1 versions prior to 21.1R2.
- 19.2 versions prior to 19.2R3-S3;
- 19.3 versions prior to 19.3R3-S3;
- 20.1 versions prior to 20.1R2-S2, 20.1R3-S1;
- 20.2 versions prior to 20.2R3-S2;
- 20.3 versions prior to 20.3R3;
- 20.4 versions prior to 20.4R3;
- 21.1 versions prior to 21.1R2.
- 12.3X48 versions prior to 12.3X48-D105;
- 15.1X49 versions prior to 15.1X49-D220;
- 18.3 versions prior to 18.3R3-S5;
- 18.4 versions prior to 18.4R3-S9;
- 19.1 versions prior to 19.1R3-S7;
- 19.2 versions prior to 19.2R3-S3;
- 19.3 versions prior to 19.3R3-S4;
- 19.4 versions prior to 19.4R3-S6;
- 20.1 versions prior to 20.1R3;
- 20.2 versions prior to 20.2R1-S1, 20.2R2;
- 20.3 versions prior to 20.3R2;
- 20.4 versions prior to 20.4R2;
- 21.1 versions prior to 21.1R2.
- All versions prior to 18.3R3-S5;
- 18.4 versions prior to 18.4R3-S9;
- 19.1 versions prior to 19.1R3-S6;
- 19.2 versions prior to 19.2R3-S3;
- 19.3 versions prior to 19.3R3-S3;
- 19.4 versions prior to 19.4R3-S5;
- 20.1 versions prior to 20.1R3-S1;
- 20.2 versions prior to 20.2R3-S2;
- 20.3 versions prior to 20.3R3-S1;
- 20.4 versions prior to 20.4R3;
- 21.1 versions prior to 21.1R2, 21.1R3;
- 21.2 versions prior to 21.2R1-S1, 21.2R2;
- 17.3 versions prior to 17.3R3-S11;
- 17.4 versions prior to 17.4R2-S13, 17.4R3-S4;
- 18.1 versions prior to 18.1R3-S12;
- 18.2 versions prior to 18.2R2-S8, 18.2R3-S7;
- 18.3 versions prior to 18.3R3-S4;
- 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7;
- 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4;
- 19.2 versions prior to 19.2R1-S6, 19.2R3-S1;
- 19.3 versions prior to 19.3R2-S5, 19.3R3-S1;
- 19.4 versions prior to 19.4R1-S4, 19.4R1-S4, 19.4R2-S3, 19.4R3-S1;
- 20.1 versions prior to 20.1R2;
- 20.2 versions prior to 20.2R2;
- 20.3 versions prior to 20.3R1-S1, 20.3R2.
- Junos OS on MX Series:
- 17.3R3-S11;
- 17.4R2-S13;
- 17.4R3 prior to 17.4R3-S5;
- 18.1R3-S12;
- 18.2R2-S8, 18.2R3-S7, 18.2R3-S8;
- 18.3R3-S4;
- 18.4R3-S7;
- 19.1R3-S4, 19.1R3-S5;
- 19.2R1-S6;
- 19.3R3-S2;
- 19.4R2-S4, 19.4R2-S5;
- 19.4R3-S2;
- 20.1R2-S1;
- 20.2R2-S2, 20.2R3-S3, 20.2R3;
- 20.3R2, 20.3R2-S1;
- 20.4R1, 20.4R1-S1, 20.4R2;
- 21.1R1;
- 17.2 version 17.2R1 and later versions;
- 17.3 versions prior to 17.3R3-S9;
- 17.4 versions prior to 17.4R2-S12, 17.4R3-S3;
- 18.1 versions prior to 18.1R3-S11;
- 18.2 versions prior to 18.2R2-S6, 18.2R3-S3;
- 18.3 versions prior to 18.3R2-S4, 18.3R3-S1;
- 18.4 versions prior to 18.4R1-S8, 18.4R2-S5, 18.4R3;
- 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3;
- 19.2 versions prior to 19.2R1-S5, 19.2R2;
- 19.3 versions prior to 19.3R2-S5, 19.3R3.
- JUNOS OS on EX2300 Series, EX3400 Series, and ACX710:
- All versions prior to 18.1R3-S13;
- 18.2 versions prior to 18.2R3-S8;
- 18.3 versions prior to 18.3R3-S5;
- 18.4 versions prior to 18.4R2-S8, 18.4R3-S9;
- 19.1 versions prior to 19.1R3-S5;
- 19.2 versions prior to 19.2R1-S7, 19.2R3-S3;
- 19.3 versions prior to 19.3R2-S6, 19.3R3-S2;
- 19.4 versions prior to 19.4R1-S4, 19.4R3-S3;
- 20.1 versions prior to 20.1R2-S2, 20.1R3;
- 20.2 versions prior to 20.2R3;
- 20.3 versions prior to 20.3R2-S1, 20.3R3;
- 20.4 versions prior to 20.4R2.
- Junos OS on SRX Series:
- 18.2 versions prior to 18.2R3-S8;
- 18.3 versions prior to 18.3R3-S5;
- 18.4 versions prior to 18.4R3-S8;
- 19.1 versions prior to 19.1R3-S5;
- 19.2 versions prior to 19.2R1-S7, 19.2R3-S3;
- 19.3 versions prior to 19.3R2-S6, 19.3R3-S3;
- 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3;
- 20.1 versions prior to 20.1R2-S2, 20.1R3;
- 20.2 versions prior to 20.2R3-S1;
- 20.3 versions prior to 20.3R2-S1, 20.3R3.
Threats:
Allows an unauthenticated attacker to perform the following:
- Privilege escalation
- Man-in-the-Middle (MitM)
Best practice and Recommendations:
The CERT team encourages users to review Juniper security advisory and apply the necessary update: