Juniper Networks has absent public with a quantity of vulnerabilities significant adequate to attract the consideration of America’s Cybersecurity and Infrastructure Safety Company.
Of the 30 vulnerabilities disclosed this 7 days, 4 are rated as important and eight are rated as higher severity.
The vital vulnerabilities have an effect on the company’s Junos Area, Contrail Networking, and Northstar Controller merchandise.
This important bulletin covers multiple vulnerabilities in 3rd-get together products and solutions delivered with Junos Space variations prior to 22.1R1.
Impacted third-party items involve the nginx resolver, Oracle Java SE, OpenSSH, Samba, the RPM bundle manager, Kerberos, OpenSSL, the Linux kernel, curl, and MySQL Server.
Juniper Networks Contrail Networking demands to be upgraded to release 21.4. to fix the Crimson Hat Common Base Impression (UBI) container impression from Crimson Hat Enterprise Linux 7 to Red Hat Enterprise Linux 8, having care of 23 vulnerabilities stretching back again to 2013.
In another repair for third-bash elements, the Junos House Protection Director Coverage Enforcer has been upgraded to use CentOS 7.9, in model 22.1R1.
In CVE-2021-23017, the nginx load balancer Juniper ships with its Northstar Controller has a distant code execution bug.
“An Off-by-a person Mistake vulnerability in the nginx resolver … will allow an unauthenticated remote attacker who is equipped to forge UDP packets from the DNS server to trigger a 1-byte memory overwrite, resulting in worker method crash or possibly, arbitrary code execution,” the advisory states.
This vulnerability is patched in version 1.20.1 of the Northstar Controller.
A amount of substantial severity bugs are also disclosed in Junos OS. The total checklist of vulnerabilities can be found listed here.