Juniper Networks Junos OS Vulnerability Allows DoS or RCE and Root Privileges
CVE-2024-21591

9.8CRITICAL

Key Information:

Status
Vendor
CVE Published:
12 January 2024

Badges

📈 Trended📈 Score: 298👾 Exploit Exists📰 News Worthy

What is CVE-2024-21591?

CVE-2024-21591 is a significant vulnerability affecting Juniper Networks' Junos OS, primarily on SRX Series and EX Series devices. This vulnerability allows unauthenticated, network-based attackers to exploit an out-of-bounds write condition, leading to Denial of Service (DoS) and Remote Code Execution (RCE) with root privileges. As Junos OS is a critical operating system for networking devices used by organizations around the world, the exploitation of this vulnerability could result in severe disruptions to network operations and potentially expose sensitive data, jeopardizing overall organizational security.

Technical Details

The vulnerability arises from the use of an insecure function within J-Web, which enables attackers to overwrite arbitrary memory locations. This flaw is present in various versions of Junos OS, specifically those released prior to certain patches that address this issue. The affected versions span multiple releases, including older versions and those in the 20.x to 22.x range. An attacker can leverage this vulnerability without needing specific access privileges, making it particularly dangerous.

Impact of the Vulnerability

  1. Denial of Service (DoS): Attackers can render affected devices inoperable, leading to significant downtime and disruption of network services. This can affect an organization's ability to conduct business and serve its clients effectively.

  2. Remote Code Execution (RCE): The vulnerability allows attackers to execute arbitrary code on the affected devices. This capability can lead to further exploits, including the installation of malware or the creation of backdoor access, posing long-term security risks.

  3. Privilege Escalation: Gaining root privileges on network devices can allow attackers to manipulate configurations, access sensitive network data, or pivot to other internal systems, amplifying the impact and potential damage of the initial exploitation.

Affected Version(s)

Junos OS SRX Series 0 < 20.4R3-S9

Junos OS SRX Series 21.2 < 21.2R3-S7

Junos OS SRX Series 21.3 < 21.3R3-S5

News Articles

Juniper fixes critical RCE in its SRX firewalls and EX switches (CVE-2024-21591) - Help Net Security

Juniper Networks has fixed a critical pre-auth RCE vulnerability (CVE-2024-21591) in Junos OS on SRX firewalls and EX switches.

1 year ago

CVE-2024-21591 в Junos OS: отказ в обслуживании и удалённое выполнение кода

Juniper Networks призывает клиентов как можно скорее обновить свои брандмауэры и коммутаторы.

1 year ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 📈

    Vulnerability started trending

  • 📰

    First article discovered by SystemTek

  • Vulnerability published

  • Vulnerability Reserved

Credit

The Juniper SIRT would like to would like to acknowledge and thank Marco Lux of Curesec for responsibly reporting this vulnerability
.