Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2024.0219 2024-01 Security Bulletin: Security Director Insights: Multiple vulnerabilities in SDI 11 January 2024 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Security Director Insights Publisher: Juniper Networks Operating System: Juniper Resolution: Patch/Upgrade CVE Names: CVE-2023-26464 CVE-2022-23307 CVE-2022-23305 CVE-2022-23302 CVE-2021-44832 CVE-2021-44228 CVE-2020-9493 CVE-2019-17571 CVE-2016-2183 Original Bulletin: https://supportportal.juniper.net/s/article/2024-01-Security-Bulletin-Security-Director-Insights-Multiple-vulnerabilities-in-SDI Comment: CVSS (Max): 10.0 CVE-2021-44228 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) CVSS Source: Juniper Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- Article ID: JSA75737 Product Affected: These issues affect all versions of Security Director Insights . Severity Level: Critical CVSS Score: 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) Problem: Security Director Insights release 23.1R1 addresses multiple vulnerabilities in 3rd party libraries found in prior releases with updated open source software components. These issues affect Juniper Networks Security Director Insights versions prior to 23.1R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. These issues were discovered during external security research. The resolved issues include: +--------------+----------+---------------------------------------------------+ | CVE | CVSS | Summary | +--------------+----------+---------------------------------------------------+ | | |The DES and Triple DES ciphers, as used in the TLS,| | |7.5 ( |SSH, and IPSec protocols and other protocols and | | |CVSS:3.1/ |products, have a birthday bound of approximately | |CVE-2016-2183 |AV:N/AC:L/|four billion blocks, which makes it easier for | | |PR:N/UI:N/|remote attackers to obtain cleartext data via a | | |S:U/C:H/ |birthday attack against a long-duration encrypted | | |I:N/A:N ) |session, as demonstrated by an HTTPS session using | | | |Triple DES in CBC mode, aka a "Sweet32" attack. | +--------------+----------+---------------------------------------------------+ | |9.8 ( |Included in Log4j 1.2 is a SocketServer class that | | |CVSS:3.1/ |is vulnerable to deserialization of untrusted data | | |AV:N/AC:L/|which can be exploited to remotely execute | |CVE-2019-17571|PR:N/UI:N/|arbitrary code when combined with a deserialization| | |S:U/C:H/ |gadget when listening to untrusted network traffic | | |I:H/A:H ) |for log data. This affects Log4j versions up to 1.2| | | |up to 1.2.17. | +--------------+----------+---------------------------------------------------+ | |9.8 ( | | | |CVSS:3.1/ |A deserialization flaw was found in Apache Chainsaw| |CVE-2020-9493 |AV:N/AC:L/|versions prior to 2.1.0 which could lead to | | |PR:N/UI:N/|malicious code execution. | | |S:U/C:H/ | | | |I:H/A:H ) | | +--------------+----------+---------------------------------------------------+ | | |JMSSink in all versions of Log4j 1.x is vulnerable | | | |to deserialization of untrusted data when the | | | |attacker has write access to the Log4j | | | |configuration or if the configuration references an| | |8.8 ( |LDAP service the attacker has access to. The | | |CVSS:3.1/ |attacker can provide a | | |AV:N/AC:L/|TopicConnectionFactoryBindingName configuration | |CVE-2022-23302|PR:L/UI:N/|causing JMSSink to perform JNDI requests that | | |S:U/C:H/ |result in remote code execution in a similar | | |I:H/A:H ) |fashion to CVE-2021-4104. Note this issue only | | | |affects Log4j 1.x when specifically configured to | | | |use JMSSink, which is not the default. Apache Log4j| | | |1.2 reached end of life in August 2015. Users | | | |should upgrade to Log4j 2 as it addresses numerous | | | |other issues from the previous versions. | +--------------+----------+---------------------------------------------------+ | | |By design, the JDBCAppender in Log4j 1.2.x accepts | | | |an SQL statement as a configuration parameter where| | | |the values to be inserted are converters from | | | |PatternLayout. The message converter, %m, is likely| | | |to always be included. This allows attackers to | | | |manipulate the SQL by entering crafted strings into| | |9.8 ( |input fields or headers of an application that are | | |CVSS:3.1/ |logged allowing unintended SQL queries to be | |CVE-2022-23305|AV:N/AC:L/|executed. Note this issue only affects Log4j 1.x | | |PR:N/UI:N/|when specifically configured to use the | | |S:U/C:H/ |JDBCAppender, which is not the default. Beginning | | |I:H/A:H ) |in version 2.0-beta8, the JDBCAppender was | | | |re-introduced with proper support for parameterized| | | |SQL queries and further customization over the | | | |columns written to in logs. Apache Log4j 1.2 | | | |reached end of life in August 2015. Users should | | | |upgrade to Log4j 2 as it addresses numerous other | | | |issues from the previous versions. | +--------------+----------+---------------------------------------------------+ | |8.8 ( | | | |CVSS:3.1/ |CVE-2020-9493 identified a deserialization issue | |CVE-2022-23307|AV:N/AC:L/|that was present in Apache Chainsaw. Prior to | | |PR:L/UI:N/|Chainsaw V2.0 Chainsaw was a component of Apache | | |S:U/C:H/ |Log4j 1.2.x where the same issue exists. | | |I:H/A:H ) | | +--------------+----------+---------------------------------------------------+ | | |** UNSUPPORTED WHEN ASSIGNED ** When using the | | | |Chainsaw or SocketAppender components with Log4j | | | |1.x on JRE less than 1.7, an attacker that manages | | |7.5 ( |to cause a logging entry involving a | | |CVSS:3.1/ |specially-crafted (ie, deeply nested) hashmap or | | |AV:N/AC:L/|hashtable (depending on which logging component is | |CVE-2023-26464|PR:N/UI:N/|in use) to be processed could exhaust the available| | |S:U/C:N/ |memory in the virtual machine and achieve Denial of| | |I:N/A:H ) |Service when the object is deserialized. This issue| | | |affects Apache Log4j before 2. Affected users are | | | |recommended to update to Log4j 2.x. NOTE: This | | | |vulnerability only affects products that are no | | | |longer supported by the maintainer. | +--------------+----------+---------------------------------------------------+ | | |Apache Log4j2 2.0-beta9 through 2.15.0 (excluding | | | |security releases 2.12.2, 2.12.3, and 2.3.1) JNDI | | | |features used in configuration, log messages, and | | | |parameters do not protect against attacker | | |10.0 ( |controlled LDAP and other JNDI related endpoints. | | |CVSS:3.1/ |An attacker who can control log messages or log | | |AV:N/AC:L/|message parameters can execute arbitrary code | |CVE-2021-44228|PR:N/UI:N/|loaded from LDAP servers when message lookup | | |S:C/C:H/ |substitution is enabled. From log4j 2.15.0, this | | |I:H/A:H ) |behavior has been disabled by default. From version| | | |2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this| | | |functionality has been completely removed. Note | | | |that this vulnerability is specific to log4j-core | | | |and does not affect log4net, log4cxx, or other | | | |Apache Logging Services projects. | +--------------+----------+---------------------------------------------------+ | | |Apache Log4j2 versions 2.0-beta7 through 2.17.0 | | |6.6 ( |(excluding security fix releases 2.3.2 and 2.12.4) | | |CVSS:3.1/ |are vulnerable to a remote code execution (RCE) | | |AV:N/AC:H/|attack when a configuration uses a JDBC Appender | |CVE-2021-44832|PR:H/UI:N/|with a JNDI LDAP data source URI when an attacker | | |S:U/C:H/ |has control of the target LDAP server. This issue | | |I:H/A:H ) |is fixed by limiting JNDI data source names to the | | | |java protocol in Log4j2 versions 2.17.1, 2.12.4, | | | |and 2.3.2. | +--------------+----------+---------------------------------------------------+ +++---------------------------------------------------------------------------+ ||| Summary of weaknesses that were fixed for which no CVE IDs or CVSS scores | ||| have been assigned: | +++---------------------------------------------------------------------------+ |||SSH Weak Message Authentication Code Algorithms: Running SSH service with | |||insecure MAC algorithms in use: umac-64@openssh.com,umac-64-etm@openssh.com| +++---------------------------------------------------------------------------+ |||TLS/SSL Weak Message Authentication Code Cipher Suites: | |||TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, | |||TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, | |||TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA | +++---------------------------------------------------------------------------+ |||SSH CBC vulnerability: A vulnerability exists in SSH messages that employ | |||CBC mode that may allow an attacker to recover plaintext from a block of | |||ciphertext. | +++---------------------------------------------------------------------------+ |||TLS/SSL Server supports the Use of Static Key Ciphers: | |||TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, | |||TLS_RSA_WITH_AES_128_CCM, TLS_RSA_WITH_AES_128_CCM_8, | |||TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, | |||TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CCM, | |||TLS_RSA_WITH_AES_256_CCM_8, TLS_RSA_WITH_AES_256_GCM_SHA384, | |||TLS_RSA_WITH_ARIA_128_GCM_SHA256, TLS_RSA_WITH_ARIA_256_GCM_SHA384, | |||TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256, | |||TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 | +++---------------------------------------------------------------------------+ Solution: The following software releases have been updated to resolve this specific issue: 23.1R1, and all subsequent releases. This issue is being tracked as PR 1715013 which is visible on the Customer Support website. Note: Juniper SIRT's policy is not to evaluate releases which are beyond End of Engineering (EOE) or End of Life (EOL). Workaround: Use access lists or firewalls to limit access to the device only from trusted hosts. Modification History: 2024-01-10: Initial Publication Related Information: o KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process o KB16765: In which releases are vulnerabilities fixed? o KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories o Report a Security Vulnerability - How to Contact the Juniper Networks Security Incident Response Team Last Updated: 2024-01-10 Created: 2024-01-10 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZZ9RC8kNZI30y1K9AQjx1Q/+NRSp9Fdna3wtqvj9RSEmeHtiikG0ydQN wnnc+FuQLHQgZBOMtMg22zZm2o/rZkw21cOqYrSFiIkw4vumbjwZNS6WvyHpqX28 Rhr6tloU2/R6ce088tRx74Dsp+IC0m9Vpb1ezOxc0wrFo6wrbqdJep35Dc5OXYXI JgzH4GM7e+l5Ge/KKc0OVm/9zWwoKdXF8l+M4JwZS3XfMYfsE2FaDgR4Wc/mQz25 LpGTTPRCJOItnCPeduRWsWD/FJiR1Mvm77J/KoGCeSni79W4Up/ixTRHppk43pXp qVYGbtrhelK3OBqNiQwZ3q51EF7NPDYwaz+W92FfKnmBM2cnXXPzWxiHTvpi+l4X sU7oNvpGcH0pnCnZq4roBPT/jmnKwRkBSgp3WrIo6/TcfNi5IVOV9bCwpi5b/jEG NGxDiRjvSKHWncOlYSqAPTKzeayMqqqN5PBzyDn27nakd0qFoNEgVmL+BMCZkCZY BWIW73bNbdP9q60irhw0fY9LskpaRJKsoKEhWWcvuaVzLMED+4FI4RVG0HuAfp50 Zfr+3gMmt0N6Zci7PQDW1+YwuXBLa1s8bCXUrtCO1x/1rlw0jIrw2tqE07xCnK5I Wz+Rvn53Bnc0BC4Qb9yhA82pyasK1XDylVikE4q0OoLdL8NCvKMm0jjNWtds2cWS OQcU4oZOJrY= =Ox7R -----END PGP SIGNATURE-----