Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2024-54
Version:
1.0
Affected software:
All versions of Juniper Cloud Native Router earlier than 23.4
All versions of Juniper cRPD before 23.4R1
All versions of Junos OS before 23.4R1-S1, 23.4R2
All versions of Junos OS Evolved before 21.4R3-S4-EVO, 22.1-EVO, 22.3-EVO, 22.4-EVO
Type:
Multiple types of vulnerabilities including Out-of-bounds Write, Improper Input Validation, Unquoted Search Path or Element, Classic Buffer Overflow,…
CVE/CVSS:
96 vulnerabilities in total, of which 8 critical vulnerabilities with a severity score of 9.8
Juniper released security updated for several of their products including Junos OS, Junos OS Evolved, cRPD & Juniper Cloud Native Router. Most of the fixes are patching vulnerabilities in third party packages used in their products. But some hardcoded credentials were also fixed in their latest software version.
In total 96 vulnerabilities are patched, 8 of these patched vulnerabilities are marked as critical. Exploitation and chaining one or more of these vulnerabilities could give an unauthenticated remote attacker full control of a Juniper device.
A lot of the patched vulnerabilities reside in an outdated version of curl used in Juniper software. Along with curl, multiple vulnerabilities in Rsyslog, util-linux, pip, core-utils, ncurses, tar, OpenSSL,… where also fixed.
CVE-2024-30407, is a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud Native Router (JCNR) and containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container. Due to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.
Patch
Update your Juniper device to one of the following versions:
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.