Exploit for Juniper SRX – vaccine against remote code or instructions for hackers?

2023-08-29 13:16:39

Exploit for Juniper SRX – vaccine against remote code or instructions for hackers?

The story of four vulnerabilities: why CISA insists on updating firewalls.

Juniper SRX firewalls have recently discovered vulnerabilities that allow remote code execution without authorization. The threat affects devices running on the non-updated JunOS operating system.

Juniper Networks disclosed four medium-severity defects in its EX-series switches and SRX firewalls two weeks ago. Patches have already been released to fix the problems.

Vulnerabilities were found in the J-Web interface written in PHP. Administrators use it to manage and configure Juniper devices on their networks. This interface became vulnerable due to flaws in the authentication processes and interaction with the file system.

The company pointed out that “using a specific request that does not require authentication, an attacker can download arbitrary files via J-Web. This results in the loss of integrity of a certain part of the file system. The vulnerabilities can then be combined with each other.”

WatchTowr Labs researchers developed and published an Exploit (from the English Exploit – means “use something to your advantage”) – a computer program, a piece of program code or a sequence of commands that use a bug or vulnerability to attack computer software, hardware or electronic devices. The goal of an attack is to take control of a computer system, privilege escalation, or a denial of service (DoS or related DDoS) attack.

Exploits are usually classified and named according to: the type of vulnerability they exploit; whether they are local or remote; as well as the result of running an exploit (for example, EoP, DoS, spoofing). One scheme that offers zero-day exploits is Exploit-as-a-Service.

” data-html=”true” data-original-title=”Exploit”>exploit that combines two key vulnerabilities: lack of authentication for a critical function ( CVE-2023-36846 ) and an error in modifying an external PHP variable ( CVE-2023-36845 ). A white paper has also been published detailing the problem analysis and exploit development process.

So far, there is no data on real attacks using these defects. However, watchTowr Labs suggests that attackers may break into non-updated Juniper devices soon. “Given the ease of use and the privileged position of JunOS devices on the network, this would not be surprising,” the researchers warned.

Administrators are advised to install patches or update JunOS to the latest version as soon as possible. As an alternative, you can disable access to the J-Web interface.

In June CISA issued this year’s first mandatory operating directive . According to the order, US federal agencies must ensure the security of Juniper equipment within two weeks after the discovery of vulnerabilities. Under the gun may be connected to the Internet or incorrectly configured devices.

1693319907
#Exploit #Juniper #SRX #vaccine #remote #code #instructions #hackers

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.