Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Juniper Patches Critical Third-Party Flaws Across Product Portfolio

Juniper Networks has shipped security patches to cover numerous vulnerabilities across its product portfolio, including a series of critical bugs in third-party software used in the company’s products.

Juniper Networks has shipped security patches to cover numerous vulnerabilities across its product portfolio, including a series of critical bugs in third-party software used in the company’s products.

The most important of the vulnerabilities is CVE-2021-0276 (CVSS score of 9.8), a stack-based buffer overflow in Juniper Networks SBR Carrier with EAP.  An attacker could exploit it by sending specific packets to cause a denial of service condition or to execute code remotely, Juniper warned in an advisory.

“By continuously sending these specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS),” the company said.

Juniper Networks SBR Carrier 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; and 8.6.0 versions prior to 8.6.0R4 are impacted if EAP authentication is configured and if Enhanced EAP Logging and TraceLevel setting of 2 are in use.

[Related: Juniper Networks Patches Critical Vulnerabilities in Firewalls ]

Juniper Networks also released patches for high-severity vulnerabilities in Junos OS and Junos OS Evolved (EVO) that could lead to Denial of Service (DoS), remote code execution (RCE), local privilege escalation, or traffic loss. Several medium-severity security holes were also addressed in Junos OS and Junos OS Evolved.

Additionally, Juniper Networks published several advisories to announce the release of fixes for multiple vulnerabilities that affect third party software used in its products.

The most important of these is a patch for Junos Space that addresses CVE-2020-1472, a critical (CVSS score of 10) vulnerability in the Netlogon Remote Protocol (MS-NRPC) that Microsoft patched in August 2020. Junos Space 21.2R1 patches this bug and 34 other vulnerabilities, including another critical flaw, several high-severity issues, and multiple medium-risk ones.

Advertisement. Scroll to continue reading.

By updating third party software, Juniper Networks also patched critical vulnerabilities in Juniper Contrail Insights, CTPView, and Contrail Networking, as well as high-severity bugs in Secure Analytics, Junos OS, and Junos OS Evolved. Multiple other lower severity flaws were also addressed in these products. 

Related: Juniper Networks Patches Critical Vulnerabilities in Firewalls

Related: Critical Vulnerability Can Allow Attackers to Hijack or Disrupt Juniper Devices

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Cloud security giant Wiz has named Fazal Merchant as President and Chief Financial Officer.

Cybersecurity and data protection company Acronis has appointed Gerald Beuchelt as CISO.

Adam Zoller has joined CrowdStrike as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.