Page MenuHomePhabricator

Juniper security advisories (April 2019)
Closed, ResolvedPublic

Description

Usual procedure:

2019-04 Security Bulletin: Junos OS: SRX5000 series: Kernel crash (vmcore) upon receipt of a specific packet on fxp0 interface (CVE-2019-0044)
https://kb.juniper.net/JSA10936

2019-04 Security Bulletin: Junos OS: RPD process crashes upon receipt of a specific SNMP packet (CVE-2019-0043)
https://kb.juniper.net/JSA10935

2019-04 Security Bulletin: Junos OS: EX4300-MP Series: IP transit traffic can reach the control plane via loopback interface. (CVE-2019-0041)
https://kb.juniper.net/JSA10933

2019-04 Security Bulletin: Junos OS: Specially crafted packets sent to port 111 on any interface triggers responses from the management interface (CVE-2019-0040)
https://kb.juniper.net/JSA10929

2019-04 Security Bulletin: Junos OS: Login credentials are vulnerable to brute force attacks through the REST API (CVE-2019-0039)
https://kb.juniper.net/JSA10928

2019-04 Security Bulletin: SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices can lead to DoS (CVE-2019-0038)
https://kb.juniper.net/JSA10927

2019-04 Security Bulletin: Junos OS: jdhcpd crash upon receipt of crafted DHCPv6 solicit message (CVE-2019-0037)
https://kb.juniper.net/JSA10926

2019-04 Security Bulletin: Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored (CVE-2019-0036)
https://kb.juniper.net/JSA10925

2019-04 Security Bulletin: Junos OS: 'set system ports console insecure' allows root password recovery on OAM volumes (CVE-2019-0035)
https://kb.juniper.net/JSA10924

2019-04 Security Bulletin: Junos OS: gRPC hardcoded credentials may allow unauthorized access to systems with Junos Network Agent installed (CVE-2019-0034)
https://kb.juniper.net/JSA10923

2019-04 Security Bulletin: SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when proxy ARP is configured. (CVE-2019-0033)
https://kb.juniper.net/JSA10922

2019-04 Security Bulletin: Junos Space Service Now and Service Insight: Organization username and password stored in plaintext in log files. (CVE-2019-0032)
https://kb.juniper.net/JSA10921

2019-04 Security Bulletin: Junos OS: jdhcpd daemon memory consumption Denial of Service when receiving specific IPv6 DHCP packets. (CVE-2019-0031)
https://kb.juniper.net/JSA10920

2019-04 Security Bulletin: Junos OS: RPD process crashes due to specific BGP peer restarts condition. (CVE-2019-0028)
https://kb.juniper.net/JSA10932

2019-04 Security Bulletin: Junos OS: BGP packets can trigger rpd crash when BGP tracing is enabled. (CVE-2019-0019)
https://kb.juniper.net/JSA10931

2019-04 Security Bulletin: QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding Engine manager (FXPC) process (CVE-2019-0008)
https://kb.juniper.net/JSA10930

These seem irrelevant as they are for "Juniper Identity Management Service" or "Juniper ATP":
https://kb.juniper.net/JSA10934
https://kb.juniper.net/JSA10918

Event Timeline

Restricted Application added a subscriber: Aklapper. · View Herald Transcript

thanks, tl;dr; all good!

2019-04 Security Bulletin: Junos OS: SRX5000 series: Kernel crash (vmcore) upon receipt of a specific packet on fxp0 interface (CVE-2019-0044)
https://kb.juniper.net/JSA10936

No SRX5000

2019-04 Security Bulletin: Junos OS: RPD process crashes upon receipt of a specific SNMP packet (CVE-2019-0043)
https://kb.juniper.net/JSA10935

No MPLS + we limit SNMP from trusted hosts

2019-04 Security Bulletin: Junos OS: EX4300-MP Series: IP transit traffic can reach the control plane via loopback interface. (CVE-2019-0041)
https://kb.juniper.net/JSA10933

No EX4300-MP

2019-04 Security Bulletin: Junos OS: Specially crafted packets sent to port 111 on any interface triggers responses from the management interface (CVE-2019-0040)
https://kb.juniper.net/JSA10929

Port 111 filtered

2019-04 Security Bulletin: Junos OS: Login credentials are vulnerable to brute force attacks through the REST API (CVE-2019-0039)
https://kb.juniper.net/JSA10928

Rest API is not enabled

2019-04 Security Bulletin: SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices can lead to DoS (CVE-2019-0038)
https://kb.juniper.net/JSA10927

No SRX340/SRX345

2019-04 Security Bulletin: Junos OS: jdhcpd crash upon receipt of crafted DHCPv6 solicit message (CVE-2019-0037)
https://kb.juniper.net/JSA10926

No DHCPv6

2019-04 Security Bulletin: Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored (CVE-2019-0036)
https://kb.juniper.net/JSA10925

No terms named internal-x

2019-04 Security Bulletin: Junos OS: 'set system ports console insecure' allows root password recovery on OAM volumes (CVE-2019-0035)
https://kb.juniper.net/JSA10924

No system ports console insecure

2019-04 Security Bulletin: Junos OS: gRPC hardcoded credentials may allow unauthorized access to systems with Junos Network Agent installed (CVE-2019-0034)
https://kb.juniper.net/JSA10923

No gRPC

2019-04 Security Bulletin: SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when proxy ARP is configured. (CVE-2019-0033)
https://kb.juniper.net/JSA10922

No proxy arp

2019-04 Security Bulletin: Junos Space Service Now and Service Insight: Organization username and password stored in plaintext in log files. (CVE-2019-0032)
https://kb.juniper.net/JSA10921

No Service Insight. No Service Now.

2019-04 Security Bulletin: Junos OS: jdhcpd daemon memory consumption Denial of Service when receiving specific IPv6 DHCP packets. (CVE-2019-0031)
https://kb.juniper.net/JSA10920

No DHCPv6

2019-04 Security Bulletin: Junos OS: RPD process crashes due to specific BGP peer restarts condition. (CVE-2019-0028)
https://kb.juniper.net/JSA10932

Only running non vulnerable Junos versions.

2019-04 Security Bulletin: Junos OS: BGP packets can trigger rpd crash when BGP tracing is enabled. (CVE-2019-0019)
https://kb.juniper.net/JSA10931

No BGP tracing enabled. BGP limited to (semi-)trusted peers.

2019-04 Security Bulletin: QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding Engine manager (FXPC) process (CVE-2019-0008)
https://kb.juniper.net/JSA10930

No BGP/IPv6/BFD on the switches

These seem irrelevant as they are for "Juniper Identity Management Service" or "Juniper ATP":
https://kb.juniper.net/JSA10934
https://kb.juniper.net/JSA10918

Indeed.