» » Juniper Networks Patches Over 200 Third-Party Component Vulnerabilities

Juniper Networks Patches Over 200 Third-Party Component Vulnerabilities

Juniper Networks Patches Over 200 Third-Party Component Vulnerabilities

House › Vulnerabilities

Juniper Networks Patches Over 200 Third-Celebration Part Vulnerabilities

By Eduard Kovacs on July 18, 2022

Tweet

Juniper Networks final week printed 21 safety advisories to tell prospects about greater than 200 vulnerabilities affecting its merchandise.

The safety holes affect Junos OS (together with on SRX, EX, PTX, QFX and MX collection gadgets), Junos Area, Contrail Networking, and Northstar Controller merchandise.

Six advisories describe six high-severity vulnerabilities which might be particular to Juniper merchandise. All besides considered one of these vulnerabilities will be exploited by an unauthenticated attacker on the community to trigger a denial of service (DoS) situation.

The remaining flaw can permit a neighborhood attacker authenticated with low privileges to take full management of the focused machine.

There are additionally six advisories with an total ranking of “essential” or “excessive severity” that describe greater than 200 points affecting third-party parts reminiscent of Nginx, OpenSSL, Samba, Java SE, SQLite and Linux. Whereas a few of these flaws are comparatively current, others date again practically a decade.

The remaining advisories describe medium-severity points affecting Junos OS.

Juniper says it’s not conscious of any assaults exploiting these vulnerabilities.

The US Cybersecurity and Infrastructure Safety Company (CISA) has suggested organizations to evaluation Juniper’s advisories and apply patches or mitigations as obligatory.

Associated: Juniper Networks Patches Vulnerabilities in Contrail Networking, Junos OS

Associated: Juniper Patches Essential Third-Celebration Flaws Throughout Product Portfolio

Get the Each day Briefing

 
 
 

  • Most Current
  • Most Learn
  • Moussouris: U.S. Ought to Resist Urge to Match China Vuln Reporting Mandate
  • Juniper Networks Patches Over 200 Third-Celebration Part Vulnerabilities
  • New Deanonymization Assault Works on Main Browsers, Web sites
  • Digium Telephones Focused in Cybercrime Marketing campaign Geared toward VoIP Programs
  • Researchers Say Thai Professional-Democracy Activists Hit by Spy ware
  • PLC and HMI Password Cracking Instruments Ship Malware
  • SecurityWeek Evaluation: Over 230 Cybersecurity M&A Offers Introduced in First Half of 2022
  • Unpatched WPBakery WordPress Plugin Vulnerability More and more Focused in Assaults
  • Provide Chain Assault Method Spoofs GitHub Commit Metadata
  • Essential Infrastructure Operators Implementing Zero Belief in OT Environments

On the lookout for Malware in All of the Fallacious Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice 12 months To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

How one can Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

How one can Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles