Skip to main content

Juniper Networks Releases Security Updates for Multiple Products

Report a cyber attack: call 0300 303 5222 or email [email protected]

Affected platforms

The following platforms are known to be affected:

Juniper Networks Junos OS - Versions: 12.3, 12.3X48, 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 182X75, 18.3, 18.4, 19.1, 19.2, 19.3, 19.4, and 20.1

Juniper Networks Junos OS Evolved - Versions: 19.1, 19.2, 19.3, and 19.4

Juniper Networks Junos Space - Version: all prior to 20.1R1

Juniper Networks Junos Space Security Director - Versions: all prior to 20.1R1

Juniper Networks Secure Analytics (JSA) - Versions: 7.3.0, 7.3.1, 7.3.2, and 7.3.3

Juniper Networks Session and Resource Control (SRC) - Versions: 4.12.0 and 4.13.0


Threat details

Introduction

Juniper Networks has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.


Remediation advice

Users and administrators are encouraged to review Juniper Networks security advisories index and apply any relevant updates.


Remediation steps

Type Step
Patch

2020-07 Security Bulletin: Juniper Secure Analytics (JSA): Multiple vulnerabilities resolved in JSA 7.3.2 patch 7, 7.3.3 patch 3, and 7.4.0 releases


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11042&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmentation (CVE-2020-1655)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11041&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak (CVE-2020-1653)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11040&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: SRC Series: Multiple vulnerabilities in Bouncy Castle


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11039&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-MPC (CVE-2020-1650)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11037&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: MX Series: PFE on the line card may crash due to memory leak. (CVE-2020-1651)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11038&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin:Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of small fragments requiring reassembly (CVE-2020-1649)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11036&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet (CVE-2020-1648)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11035&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution due to the processing of a specific HTTP message when ICAP redirect service is enabled (CVE-2020-1647)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11034&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS and Junos OS Evolved: RPD crash while processing a specific BGP update information. (CVE-2020-1646)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11033&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: SRX Series: processing a malformed HTTP message when ICAP redirect service is enabled may can lead to flowd process crash or remote code execution (CVE-2020-1654)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11031&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS and Junos OS Evolved: RPD crash due to specific BGP UPDATE packets (CVE-2020-1644)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11032&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: A race condition on receipt of crafted LLDP packets leads to a memory leak and an LLDP crash. (CVE-2020-1641)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11027&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: MX Series: Services card might restart when DNS filtering is enabled (CVE-2020-1645)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11028&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: NFX150: Multiple vulnerabilities in BIOS firmware (INTEL-SA-00241)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11026&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS and Junos OS Evolved: OpenSSL Security Advisory [20 Dec 2019]


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11025&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos Space and Junos Space Security Director: Multiple vulnerabilities resolved in 20.1R1 release


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: RPD crash when executing specific "show ospf interface" commands from the CLI with OSPF authentication configured (CVE-2020-1643)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11030&cat=SIRT_1&actp=LIST
Patch

2020-07 Security Bulletin: Junos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash. (CVE-2020-1640)


https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11024&cat=SIRT_1&actp=LIST

Last edited: 16 July 2020 1:32 pm