Critical Vulnerability Found in Juniper Networks Firewalls – Update Your Devices Now

CVECVE-2024-21591
CVSScvssV3_1: 9.8
SourceCVE-2024-21591

Security researchers have discovered a serious vulnerability in Juniper Networks firewall products that could allow remote attackers to take complete control of affected devices.

The vulnerability is a memory overflow issue in the web interface software (J-Web) used by Juniper’s SRX Series and EX Series firewalls. By sending specially crafted requests, an attacker on the network could exploit this to write arbitrary data past the end of allocated memory.

This could allow the attacker to crash the device, causing a denial of service, or even execute code of their choice with root privileges on the system. Once in control of the firewall, an attacker would be able to view and modify traffic passing through it, compromise systems on the internal network, and more.

Juniper has released security updates to address this for most recent versions, but many devices may still be running older, vulnerable software. It is strongly recommended that all administrators of Juniper SRX and EX firewalls update to the latest version without delay. Regular patching is also important to protect against future vulnerabilities.

Be sure to check your firewalls and contact Juniper support if you are unsure of your current software version. Taking prompt action greatly reduces the risk of this serious vulnerability being exploited by malicious actors on the internet.

References