Rewterz Threat Advisory – Horner Automation Cscape Code Execution Vulnerabilities
October 18, 2019Rewterz Threat Alert – Vulnerable Corporate VPNs Exploited in the Wild
October 18, 2019Rewterz Threat Advisory – Horner Automation Cscape Code Execution Vulnerabilities
October 18, 2019Rewterz Threat Alert – Vulnerable Corporate VPNs Exploited in the Wild
October 18, 2019Severity
High
Analysis Summary
A vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service. The vulnerability specifically affects MX Series routers configured with SIP ALG and NAT. The Session Initiation Protocol (SIP) is a signaling protocol for initiating, modifying, and terminating multimedia sessions over the internet. An attacker can exploit this issue by sending specially-crafted SIP packets to crash the MS-PIC component on MS-MIC or MS-MPC. Repeated successful exploitation of this vulnerability could result in prolonged denial of service conditions.
Impact
Denial of Service
Affected Vendors
Juniper
Affected Products
- 16.1 versions prior to 16.1R7-S5
- 16.2 versions prior to 16.2R2-S11
- 17.1 versions prior to 17.1R3
- 17.2 versions prior to 17.2R3-S3
- 17.3 versions prior to 17.3R3-S6
- 17.4 versions prior to 17.4R2-S8
- 17.4R3
- 18.1 versions prior to 18.1R3-S3
- 18.2 versions prior to 18.2R3
- 18.3 versions prior to 18.3R2
- 18.4 versions prior to 18.4R2
Remediation
Please see vendor’s advisory for the list of available patches and updates.
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10964&cat=SIRT_1&actp=LIST