Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Juniper Patches Critical Third-Party Flaws Across Product Portfolio

Juniper Networks has shipped security patches to cover numerous vulnerabilities across its product portfolio, including a series of critical bugs in third-party software used in the company’s products.

Juniper Networks has shipped security patches to cover numerous vulnerabilities across its product portfolio, including a series of critical bugs in third-party software used in the company’s products.

The most important of the vulnerabilities is CVE-2021-0276 (CVSS score of 9.8), a stack-based buffer overflow in Juniper Networks SBR Carrier with EAP.  An attacker could exploit it by sending specific packets to cause a denial of service condition or to execute code remotely, Juniper warned in an advisory.

“By continuously sending these specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS),” the company said.

Juniper Networks SBR Carrier 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; and 8.6.0 versions prior to 8.6.0R4 are impacted if EAP authentication is configured and if Enhanced EAP Logging and TraceLevel setting of 2 are in use.

[Related: Juniper Networks Patches Critical Vulnerabilities in Firewalls ]

Juniper Networks also released patches for high-severity vulnerabilities in Junos OS and Junos OS Evolved (EVO) that could lead to Denial of Service (DoS), remote code execution (RCE), local privilege escalation, or traffic loss. Several medium-severity security holes were also addressed in Junos OS and Junos OS Evolved.

Additionally, Juniper Networks published several advisories to announce the release of fixes for multiple vulnerabilities that affect third party software used in its products.

The most important of these is a patch for Junos Space that addresses CVE-2020-1472, a critical (CVSS score of 10) vulnerability in the Netlogon Remote Protocol (MS-NRPC) that Microsoft patched in August 2020. Junos Space 21.2R1 patches this bug and 34 other vulnerabilities, including another critical flaw, several high-severity issues, and multiple medium-risk ones.

By updating third party software, Juniper Networks also patched critical vulnerabilities in Juniper Contrail Insights, CTPView, and Contrail Networking, as well as high-severity bugs in Secure Analytics, Junos OS, and Junos OS Evolved. Multiple other lower severity flaws were also addressed in these products. 

Related: Juniper Networks Patches Critical Vulnerabilities in Firewalls

Related: Critical Vulnerability Can Allow Attackers to Hijack or Disrupt Juniper Devices

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Nation-State

The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...