Rewterz Threat Alert – Donot APT Group – IOCs
July 15, 2021Rewterz Threat Alert – Remcos RAT – Active IOCs
July 15, 2021Rewterz Threat Alert – Donot APT Group – IOCs
July 15, 2021Rewterz Threat Alert – Remcos RAT – Active IOCs
July 15, 2021Severity
Medium
Analysis Summary
CVE-2021-0290
Improper Handling of Exceptional Conditions in Ethernet interface frame processing of Juniper Networks Junos OS allows an attacker to send specially crafted frames over the local Ethernet segment, causing the interface to go into a down state, resulting in a Denial of Service (DoS) condition. The interface does not recover on its own and the FPC must be reset manually. Continued receipt and processing of these frames will create a sustained Denial of Service (DoS) condition.
CVE-2021-0277
An Out-of-bounds Read vulnerability in the processing of specially crafted LLDP frames by the Layer 2 Control Protocol Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS), or may lead to remote code execution (RCE). Continued receipt and processing of these frames, sent from the local broadcast domain, will repeatedly crash the l2cpd process and sustain the Denial of Service (DoS) condition.
CVE-2018-6925
In Juniper Networks Junos OS there are various cases in the IPv6 socket code where the protocol control block’s state flags are modified during a syscall, but are not restored if the operation fails. This can leave the control block in an inconsistent state. The protocol control block is a structure that maintains the Network Layer state for various sockets. There are various state flags that must be properly maintained to keep the structure consistent. Due to improper maintenance of the IPv6 protocol control block flags through various failure paths, an unprivileged authenticated local user may be able to cause a NULL pointer dereference causing the kernel to crash allowing an attacker to cause a Denial of Service (DoS) condition.
CVE-2019-8936
On Juniper Networks Junos OS Evolved devices, where ntp is enabled a crafted malicious authenticated mode 6 packet from a permitted network address, can trigger a NULL pointer dereference. Note for this attack to work, the sending system must be on an address from which the target ntpd accepts mode 6 packets, and must use a private key that is specifically listed as being used for mode 6 authorization. The ntpd daemon can crash due to the NULL pointer dereference, causing a Denial of Service (DoS).
CVE-2021-0276
A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS).
CVE-2021-0278
An Improper Input Validation vulnerability in J-Web of Juniper Networks Junos OS allows a locally authenticated attacker to escalate their privileges to root over the target device.
CVE-2021-0280
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on PTX platforms and QFX10K Series with Paradise (PE) chipset-based line cards, ddos-protection configuration changes made from the CLI will not take effect as expected beyond the default DDoS (Distributed Denial of Service) settings in the Packet Forwarding Engine (PFE). This may cause BFD sessions to flap when a high rate of specific packets are received. Flapping of BFD sessions in turn may impact routing protocols and network stability, leading to a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.
CVE-2021-0279
Juniper Networks Contrail Cloud (CC) releases prior to 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials. The messaging services of RabbitMQ are used when coordinating operations and status information among Contrail services. An attacker with access to an administrative service for RabbitMQ (e.g. GUI), can use these hardcoded credentials to cause a Denial of Service (DoS) or have access to unspecified sensitive system information.
CVE-2021-0281
On Juniper Networks Junos OS and Junos OS Evolved devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition.
CVE-2021-0282
On Juniper Networks Junos OS devices with Multipath or add-path feature enabled, processing a specific BGP UPDATE can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued receipt and processing of this UPDATE message will create a sustained Denial of Service (DoS) condition.
CVE-2021-0285
An uncontrolled resource consumption vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series switches allows an attacker, which is sending large amounts of legitimate traffic destined to the device, to cause Interchassis Control Protocol (ICCP) interruptions leading to an unstable control connection between the MC-LAG nodes which can in turn lead to traffic loss.
Continued receipt of this amount of traffic will create a sustained Denial of Service (DoS) condition.
CVE-2021-0286
A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) process to crash and restart, impacting all traffic going through the FPC, resulting in a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition.
CVE-2021-0287
In an Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued link flaps will create a sustained Denial of Service (DoS) condition.
CVE-2021-0288
A vulnerability in the processing of specific MPLS packets in Juniper Networks Junos OS on MX Series, EX9200 Series with Trio-based MPC (Modular Port Concentrator) may cause FPC to crash and lead to a Denial of Service (DoS) condition. Continued receipt of this packet will sustain the Denial of Service (DoS) condition.
CVE-2021-0291
An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource. A high rate of specific traffic may lead to a partial Denial of Service (DoS) as the CPU utilization of the RE is significantly increased.
CVE-2021-0292
An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition. Link-layer functions such as IPv4 and/or IPv6 address resolution may be impacted, leading to traffic loss. The processes do not recover on their own and must be manually restarted.
CVE-2021-0293
vulnerability in Juniper Networks Junos OS caused by Missing Release of Memory after Effective Lifetime leads to a memory leak each time the CLI command ‘show system connections extensive’ is executed. The amount of memory leaked on each execution depends on the number of TCP connections from and to the system. Repeated execution will cause more memory to leak and eventually daemons that need to allocate additionally memory and ultimately the kernel to crash, which will result in traffic loss. Continued execution of this command will cause a sustained Denial of Service (DoS) condition.
CVE-2021-0294
A vulnerability in Juniper Networks Junos OS, which only affects the release 18.4R2-S5, where a function is inconsistently implemented on Juniper Networks Junos QFX5000 Series and EX4600 Series, and if ‘storm-control enhanced’ is configured, can lead to the enhanced storm control filter group not be installed. It will cause storm control not to work hence allowing an attacker to cause high CPU usage or packet loss issues by sending a large amount of broadcast or unknown unicast packets arriving the device.
CVE-2021-0284, CVE-2021-0283
A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS).
By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition.
CVE-2021-0295
A vulnerability in the Distance Vector Multicast Routing Protocol (DVMRP) of Juniper Networks Junos OS on the QFX10K Series switches allows an attacker to trigger a packet forwarding loop, leading to a partial Denial of Service (DoS). The issue is caused by DVMRP packets looping on a multi-homed Ethernet Segment Identifier (ESI) when VXLAN is configured. DVMRP packets received on a multi-homed ESI are sent to the peer, and then incorrectly forwarded out the same ESI, violating the split horizon rule.
Impact
- Denial of Service
- Privilege escalation
Affected Vendors
Juniper
Affected Products
- Junos OS 16.1
- Junos OS 19.3
- Junos OS 12.3
- Juniper Junos OS 15.1
- Juniper Junos OS 17.3
- Juniper Junos OS 18.1
- Juniper Junos OS 18.3
- Juniper Junos OS 19.1
- Juniper Contrail Cloud
- Juniper Networks Junos OS 18.4R2-S5 on QFX5000 Series and EX4600 Series
Remediation
Refer to Juniper advisory for the complete list of affected products and their respective patches.
https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIES