QID 43926

Date Published: 2022-10-18

QID 43926: Juniper Network Operating System (Junos OS) Multiple Security Vulnerabilities (JSA69899)

Juniper Junos is the network operating system used in Juniper Networks hardware systems.

Multiple vulnerabilities have been found in the J-Web component of Juniper Networks Junos OS. One or more of these issues could lead to unauthorized local file access, cross-site scripting attacks, path injection and traversal, or local file inclusion.

Affected Junos versions:
All versions prior to 19.1R3-S9
19.2 versions prior to 19.2R3-S6
19.3 versions prior to 19.3R3-S7
19.4 versions prior to 19.4R3-S9
20.1 versions prior to 20.1R3-S5
20.2 versions prior to 20.2R3-S5
20.3 versions prior to 20.3R3-S5
20.4 versions prior to 20.4R3-S4
21.1 versions prior to 21.1R3-S2
21.2 versions prior to 21.2R3-S1
21.3 versions prior to 21.3R3
21.4 versions prior to 21.4R3
22.1 versions prior to 22.1R2

NOTE:
This issue only affects Juniper Networks Junos OS devices with HTTP/HTTPS services enabled.

QID detection logic: (Authenticated)
It checks for vulnerable Junos OS versions and If the HTTP and HTTPS services are disabled then, QID will not be flagged.

Successful exploitation of these vulnerability may allow an attacker to steal sensitive user information or sensitive file disclosure.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.1 severity.
  • Solution
    The following software releases have been updated to resolve these specific issues: Junos OS 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases. For more information please refer JSA69899

    Workaround:
    Disable J-Web, or limit access to only trusted hosts.

    Software Advisories
    Advisory ID Software Component Link
    JSA69899 URL Logo supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-J-Web?language=en_US