Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-2343— SRX Series: Hardcoded credentials in Integrated UserFW feature.

EPSS 3.09% · P87
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-2343

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
SRX Series: Hardcoded credentials in Integrated UserFW feature.
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services authentication API, hardcoded credentials were identified and removed which can impact both the SRX Series device, and potentially LDAP and Active Directory integrated points. An attacker may be able to completely compromise SRX Series devices, as well as Active Directory servers and services. When Active Directory is compromised, it may allow access to user credentials, workstations, servers performing other functions such as email, database, etc. Inter-Forest Active Directory deployments may also be at risk as the attacker may gain full administrative control over one or more Active Directories depending on the credentials supplied by the administrator of the AD domains and SRX devices performing integrated authentication of users, groups and devices. To identify if your device is potentially vulnerable to exploitation, check to see if the service is operating; from CLI review the following output: root@SRX-Firewall# run show services user-identification active-directory-access domain-controller status extensive A result of "Status: Connected" will indicate that the service is active on the device. To evaluate if user authentication is occurring through the device: root@SRX-Firewall# run show services user-identification active-directory-access active-directory-authentication-table all Next review the results to see if valid users and groups are returned. e.g. Domain: juniperlab.com Total entries: 3 Source IP Username groups state 172.16.26.1 administrator Valid 192.168.26.2 engg01 engineers Valid 192.168.26.3 guest01 guests Valid Domain: NULL Total entries: 8 Source IP Username groups state 192.168.26.4 Invalid 192.168.26.5 Invalid This will also indicate that Valid users and groups are authenticating through the device. Affected releases are Juniper Networks Junos OS 12.3X48 from 12.3X48-D30 and prior to 12.3X48-D35 on SRX series; 15.1X49 from 15.1X49-D40 and prior to 15.1X49-D50 on SRX series. Devices on any version of Junos OS 12.1X46, or 12.1X47 are unaffected by this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper SRX Series设备Junos OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper SRX Series devices是美国瞻博网络(Juniper Networks)公司的一个SRX系列网关设备。Junos OS是使用在其中的操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper SRX Series设备上的Junos OS 12.3X48版本和15.1X49版本存在安全漏洞。远程攻击者可利用该漏洞获取目标系统的访问权限,并控制系统。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 12.3X48 from 12.3X48-D30 and prior to 12.3X48-D35 -

II. Public POCs for CVE-2017-2343

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-2343

Please Login to view more intelligence information

Same Patch Batch · Juniper Networks · 2017-07-14 · 20 CVEs total

CVE-2017-2338ScreenOS: XSS vulnerability in ScreenOS Firewall
CVE-2017-2349SRX Series: Command injection vulnerability in SRX IDP feature.
CVE-2017-2348Junos OS: jdhcpd daemon crash due to invalid IPv6 UDP packets
CVE-2017-2347Junos: Denial of Service vulnerability in rpd daemon
CVE-2017-2346MS-MPC or MS-MIC crash when passing large fragmented traffic through an ALG
CVE-2017-2345Junos: snmpd denial of service upon receipt of crafted SNMP packet
CVE-2017-2344Junos: Buffer overflow in sockets library
CVE-2017-2342SRX Series: MACsec failure to report errors
CVE-2017-2341Junos OS: VM to host privilege escalation in platforms with Junos OS running in a virtuali
CVE-2017-2339ScreenOS: XSS vulnerability in ScreenOS Firewall
CVE-2017-10601Junos OS: Insufficient authentication for user login when a specific system configuration
CVE-2017-2337ScreenOS: XSS vulnerability in ScreenOS Firewall
CVE-2017-2336ScreenOS: XSS vulnerability in ScreenOS Firewall
CVE-2017-2335ScreenOS: XSS vulnerability in ScreenOS Firewall
CVE-2017-2314Junos: RPD crash due to malformed BGP OPEN message
CVE-2017-10605Junos: SRX Series denial of service vulnerability in flowd due to crafted DHCP packet
CVE-2017-10604Junos OS: SRX Series: Cluster configuration sync failures occur if the root user account i
CVE-2017-10603Junos OS: Local XML Injection through CLI command can lead to privilege escalation
CVE-2017-10602Junos OS: buffer overflow vulnerability in Junos CLI

IV. Related Vulnerabilities

V. Comments for CVE-2017-2343

No comments yet


Leave a comment