Your review has been sent successfully

Juniper Updates

2540
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

14 October, 2021

● Critical

2021-3683

All

Description:

Juniper has released a security update to address multiple vulnerabilities in the following products, the most important ones:

  • Windows versions earlier than 20.4.12.20
  • macOS versions earlier than 21.3.4.52, iOS versions earlier than 21.2.2.1
  • Android versions earlier than 21.1.5.01.CTPView:
    • 9.1 versions prior to 9.1R3
    • 7.3 versions prior to 7.3R7
  • Junos OS Evolved:
    • All versions prior to 20.3R2-S1-EVO
    • All versions prior to 20.4R3-S1-EVO;
    • All versions of 21.1-EVO and 21.2-EVO.
  • Juniper Networks Junos OS
    • 20.4 versions prior to 20.4R2-EVO;
    • 21.1 versions prior to 21.1R2-EVO.
    • 18.4 versions prior to 18.4R1-S8, 18.4R2-S8, 18.4R3-S8;
    • 19.1 versions prior to 19.1R2-S3, 19.1R3-S5
    • 19.2 versions prior to 19.2R1-S7, 19.2R3-S2
    • 19.3 versions prior to 19.3R2-S6, 19.3R3-S2;
    • 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3;
    • 20.1 versions prior to 20.1R2-S2, 20.1R3;
    • 20.2 versions prior to 20.2R2-S3, 20.2R3;
    • 20.3 versions prior to 20.3R2-S1, 20.3R3;
    • 20.4 versions prior to 20.4R2.
    • 19.3R3-S2;
    • 19.4R3-S3;
    • 20.2 versions 20.2R2-S3 and later, prior to 20.2R3-S2;
    • 20.3 versions 20.3R2 and later, prior to 20.3R3;
    • 20.4 versions 20.4R2 and later, prior to 20.4R3;
    • 21.1 versions prior to 21.1R2.
    • 19.2 versions prior to 19.2R3-S3;
    • 19.3 versions prior to 19.3R3-S3;
    • 20.1 versions prior to 20.1R2-S2, 20.1R3-S1;
    • 20.2 versions prior to 20.2R3-S2;
    • 20.3 versions prior to 20.3R3;
    • 20.4 versions prior to 20.4R3;
    • 21.1 versions prior to 21.1R2.
    • 12.3X48 versions prior to 12.3X48-D105;
    • 15.1X49 versions prior to 15.1X49-D220;
    • 18.3 versions prior to 18.3R3-S5;
    • 18.4 versions prior to 18.4R3-S9;
    • 19.1 versions prior to 19.1R3-S7;
    • 19.2 versions prior to 19.2R3-S3;
    • 19.3 versions prior to 19.3R3-S4;
    • 19.4 versions prior to 19.4R3-S6;
    • 20.1 versions prior to 20.1R3;
    • 20.2 versions prior to 20.2R1-S1, 20.2R2;
    • 20.3 versions prior to 20.3R2;
    • 20.4 versions prior to 20.4R2;
    • 21.1 versions prior to 21.1R2.
    • All versions prior to 18.3R3-S5;
    • 18.4 versions prior to 18.4R3-S9;
    • 19.1 versions prior to 19.1R3-S6;
    • 19.2 versions prior to 19.2R3-S3;
    • 19.3 versions prior to 19.3R3-S3;
    • 19.4 versions prior to 19.4R3-S5;
    • 20.1 versions prior to 20.1R3-S1;
    • 20.2 versions prior to 20.2R3-S2;
    • 20.3 versions prior to 20.3R3-S1;
    • 20.4 versions prior to 20.4R3;
    • 21.1 versions prior to 21.1R2, 21.1R3;
    • 21.2 versions prior to 21.2R1-S1, 21.2R2;
    • 17.3 versions prior to 17.3R3-S11;
    • 17.4 versions prior to 17.4R2-S13, 17.4R3-S4;
    • 18.1 versions prior to 18.1R3-S12;
    • 18.2 versions prior to 18.2R2-S8, 18.2R3-S7;
    • 18.3 versions prior to 18.3R3-S4;
    • 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7;
    • 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4;
    • 19.2 versions prior to 19.2R1-S6, 19.2R3-S1;
    • 19.3 versions prior to 19.3R2-S5, 19.3R3-S1;
    • 19.4 versions prior to 19.4R1-S4, 19.4R1-S4, 19.4R2-S3, 19.4R3-S1;
    • 20.1 versions prior to 20.1R2;
    • 20.2 versions prior to 20.2R2;
    • 20.3 versions prior to 20.3R1-S1, 20.3R2.
  • Junos OS on MX Series:
    • 17.3R3-S11;
    • 17.4R2-S13;
    • 17.4R3 prior to 17.4R3-S5;
    • 18.1R3-S12;
    • 18.2R2-S8, 18.2R3-S7, 18.2R3-S8;
    • 18.3R3-S4;
    • 18.4R3-S7;
    • 19.1R3-S4, 19.1R3-S5;
    • 19.2R1-S6;
    • 19.3R3-S2;
    • 19.4R2-S4, 19.4R2-S5;
    • 19.4R3-S2;
    • 20.1R2-S1;
    • 20.2R2-S2, 20.2R3-S3, 20.2R3;
    • 20.3R2, 20.3R2-S1;
    • 20.4R1, 20.4R1-S1, 20.4R2;
    • 21.1R1;
    • 17.2 version 17.2R1 and later versions;
    • 17.3 versions prior to 17.3R3-S9;
    • 17.4 versions prior to 17.4R2-S12, 17.4R3-S3;
    • 18.1 versions prior to 18.1R3-S11;
    • 18.2 versions prior to 18.2R2-S6, 18.2R3-S3;
    • 18.3 versions prior to 18.3R2-S4, 18.3R3-S1;
    • 18.4 versions prior to 18.4R1-S8, 18.4R2-S5, 18.4R3;
    • 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3;
    • 19.2 versions prior to 19.2R1-S5, 19.2R2;
    • 19.3 versions prior to 19.3R2-S5, 19.3R3.
  • JUNOS OS on EX2300 Series, EX3400 Series, and ACX710:
    • All versions prior to 18.1R3-S13;
    • 18.2 versions prior to 18.2R3-S8;
    • 18.3 versions prior to 18.3R3-S5;
    • 18.4 versions prior to 18.4R2-S8, 18.4R3-S9;
    • 19.1 versions prior to 19.1R3-S5;
    • 19.2 versions prior to 19.2R1-S7, 19.2R3-S3;
    • 19.3 versions prior to 19.3R2-S6, 19.3R3-S2;
    • 19.4 versions prior to 19.4R1-S4, 19.4R3-S3;
    • 20.1 versions prior to 20.1R2-S2, 20.1R3;
    • 20.2 versions prior to 20.2R3;
    • 20.3 versions prior to 20.3R2-S1, 20.3R3;
    • 20.4 versions prior to 20.4R2.
  • Junos OS on SRX Series:
    • 18.2 versions prior to 18.2R3-S8;
    • 18.3 versions prior to 18.3R3-S5;
    • 18.4 versions prior to 18.4R3-S8;
    • 19.1 versions prior to 19.1R3-S5;
    • 19.2 versions prior to 19.2R1-S7, 19.2R3-S3;
    • 19.3 versions prior to 19.3R2-S6, 19.3R3-S3;
    • 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3;
    • 20.1 versions prior to 20.1R2-S2, 20.1R3;
    • 20.2 versions prior to 20.2R3-S1;
    • 20.3 versions prior to 20.3R2-S1, 20.3R3.

Threats:

Allows an unauthenticated attacker to perform the following:

  • Privilege escalation
  • Man-in-the-Middle (MitM)

Best practice and Recommendations:

The CERT team encourages users to review Juniper security advisory and apply the necessary update:

Last updated at 14 October, 2021

Rate the content

rate-icon
up icon