Exploit released for Juniper firewall bugs allowing RCE attacks

Proof-of-concept exploit code has been publicly released for vulnerabilities in Juniper SRX firewalls that, when chained, can allow unauthenticated attackers to gain remote code execution in Juniper’s JunOS on unpatched devices.

Juniper disclosed four medium-severity bugs in its EX switches and SRX firewalls and released security patches two weeks ago.

The security flaws were found in the PHP-based J-Web interface that admins can use to manage and configure Juniper devices on their networks.

WatchTowr Labs security researchers have since developed and released a proof-of-concept exploit that chains the SRX firewall flaws, a missing authentication for critical function vulnerability and a PHP external variable modification bug.

While Juniper has not provided any info on active exploitation of the security flaws in the wild, watchTowr Labs expects attackers to soon start targeting Juniper devices left unpatched in widescale attacks.

New PaperCut critical bug exposes unpatched servers to RCE attacks.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

Recent News

Featured Services

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

BOOK A MEETING

Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g: gmail.com, hotmail.com, etc.)

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.