Heimdal Security Blog

Multiple Vulnerabilities Discovered in Juniper Junos OS

A series of severe security flaws have been disclosed to affect Juniper Networks devices, some of which might end up being exploited to achieve unauthorized access or remote code execution.

Out of the vulnerabilities presented in the vendor`s advisory, the most dangerous one appears to be CVE-2022-22241, a remote pre-authenticated PHP archive file deserialization vulnerability with the CVSS score of 8.1. This flaw can be found in the J-Web component of Junos OS, according to Octagon Networks researcher Paulos Yibelo. Attackers could exploit this vulnerability by sending a crafted POST request, thus triggering a deserialization which further leads to a remote code execution (RCE).

The five other vulnerabilities that have been identified are as follows:

According to The Hacker News, these issues have already been addressed in Junos OS versions 19.1R3-S9, 19.2R3-S6, 19.3R3-S7, 19.4R3-S9, 20.1R3-S5, 20.2R3-S5, 20.3R3-S5, 20.4R3-S4, 21.1R3-S2, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and later.

As a workaround, the advisory recommends disabling J-Web or limiting the access to only trusted hosts. Additionally, any JunOS devices should be updated to the latest version, in order to mitigate these vulnerabilities.

If you liked this article, follow us on LinkedInTwitterFacebookYouTube, and Instagram for more cybersecurity news and topics.