Number: AV18-011
Date: 16 January 2018
Purpose
The purpose of this advisory is to bring attention to security bulletins released by Juniper Networks.
Assessment
Juniper Networks has released product updates addressing vulnerabilities in Junos OS, CTPView, Junos Space, ScreenOS, Security Director and Log Collector. Successful exploitation of these vulnerabilities could result in remote arbitrary code execution, remote denial of service, and bypass of the security policy.
Affected Products:
- Junos OS versions 12.1X46 prior to 12.1X46-D71
- Junos OS versions 12.1X46 prior to 12.1X46-D71 on SRX
- Junos OS versions 12.3R12 prior to 12.3R12-S7
- Junos OS versions 12.3R prior to 12.3R12-S7
- Junos OS versions 12.3 prior to 12.3R12-S7
- Junos OS versions 12.3X48 versions 12.3X48-D55 and above but before 12.3X48-D65
- Junos OS versions 12.3X48 prior to 12.3X48-D55
- Junos OS versions 12.3X48 prior to 12.3X48-D55 on SRX
- Junos OS versions 14.1 prior to 14.1R8-S5, 14.1R9
- Junos OS versions 14.1 prior to 14.1R9 on MX series
- Junos OS versions 14.1X53 prior to 14.1X53-D40 on QFX, EX
- Junos OS versions 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 and 14.1X53-D107
- Junos OS versions 14.2 prior to 14.2R7-S9, 14.2R8
- Junos OS versions 14.2 prior to 14.2R8
- Junos OS versions 14.2 prior to 14.2R8 on MX series
- Junos OS versions 15.1R5-S4, 15.1R5-S5 and 15.1R6
- Junos OS versions 15.1 prior to 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7
- Junos OS versions 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3
- Junos OS versions 15.1 prior to 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 on MX series
- Junos OS versions 15.1 prior to 15.1R6-S2, 15.1R7
- Junos OS versions 15.1X49 versions 15.1X49-D100 and above but before 15.1X49-D121
- Junos OS versions 15.1X49 prior to 15.1X49-D110 on SRX
- Junos OS versions 15.1X53 prior to 15.1X53-D232 on QFX5200 / 5110
- Junos OS versions 15.1X53 prior to 15.1X53-D49, 15.1X53-D470 on NFX
- Junos OS versions 15.1X53 prior to 15.1X53-D65 on QFX10K
- Junos OS versions 15.1X53 prior to 15.1X53-D70, 15.1X53-D231
- Junos OS versions 16.1 prior to 16.1R3-S6, 16.1R4-S6 and 16.1R5
- Junos OS versions 16.1 prior to 16.1R5-S1, 16.1R6
- Junos OS versions 16.1 prior to 16.1R6 on MX series
- Junos OS versions 16.1X65 prior to 16.1X65-D45
- Junos OS versions 16.2 prior to 16.2R2, 16.2R2-S2, 16.2R3
- Junos OS versions 16.2 prior to 16.2R3 on MX series
- Junos OS versions 17.1 prior to 17.1R2-S5, 17.1R3 and 17.1R3 on MX series
- Junos OS versions 17.2X75 prior to 17.2X75-D50
- CTPView versions 7.1, 7.2 and 7.3.
- Junos Space prior to 17.2R1
- Security Director and Log Collector prior to 17.2R1
- ScreenOS all versions without the latest security patch
CVE Reference: CVE-2015-5174, CVE-2015-5188, CVE-2015-5220, CVE-2015-5304, CVE-2015-5600, CVE-2015-6563, CVE-2015-6564, CVE-2015-7236, CVE-2015-7501, CVE-2016-2141, CVE-2016-8655, CVE-2016-8743, CVE-2016-8858, CVE-2017-1000111, CVE-2017-1000112, CVE-2017-14106, CVE-2017-2634, CVE-2017-3167, CVE-2017-3169, CVE-2017-5645, CVE-2017-5664, CVE-2017-6074, CVE-2017-7668, CVE-2017-7679, CVE-2017-9788, CVE-2017-9798, CVE-2018-0001, CVE-2018-0002, CVE-2018-0003, CVE-2018-0004, CVE-2018-0005, CVE-2018-0006, CVE-2018-0007, CVE-2018-0008, CVE-2018-0009, CVE-2018-0010, CVE-2018-0011, CVE-2018-0012, CVE-2018-0013, CVE-2018-0014
Suggested action
CCIRC recommends that system administrators test and deploy the vendor released updates on affected platforms accordingly.
References
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10828&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10829&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10830&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10831&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10832&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10833&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10834&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10835&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10836&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10837&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10838&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10839&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10840&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10841&cat=SIRT_1&actp=LIST