漏洞标题
SRX 系列:Integrated UserFW 功能中内置了凭证。
漏洞描述信息
集成用户防火墙(UserFW)功能是在Juniper SRX系列设备的Junos OS版本12.1X47-D10中引入的,目的是在现有的防火墙策略之上提供用户配置文件的简单集成。作为对UserFW服务身份验证API的内部安全审查的一部分,我们识别并移除了硬编码的凭据,这可能会影响SRX系列设备,以及可能集成到LDAP和活动目录的点。攻击者可能能够完全破坏SRX系列设备以及活动目录服务器和服务。如果活动目录被破坏,攻击者可能能够访问用户凭据、工作站以及执行其他功能(如电子邮件、数据库等)的服务器。在跨森林活动目录部署中,攻击者可能根据活动目录域和执行集成身份验证的SRX设备的管理员提供的凭据,完全获取一个或多个活动目录的管理控制权,这也可能构成风险。要识别您的设备是否可能受到漏洞的利用,请检查服务是否正在运行;从命令行审查以下输出: root@SRX-Firewall# run show services user-identification active-directory-access domain-controller status extensive 结果为"Status: Connected"表示服务已在设备上激活。要评估用户身份验证是否正在通过设备进行,请运行以下命令: root@SRX-Firewall# run show services user-identification active-directory-access active-directory-authentication-table all 接下来审查结果,看看是否返回了有效用户和组。例如: Domain: juniperlab.com Total entries: 3 Source IP Username groups state 172.16.26.1 administrator Valid 192.168.26.2 engg01 engineers Valid 192.168.26.3 guest01 guests Valid Domain: NULL Total entries: 8 Source IP Username groups state 192.168.26.4 Invalid 192.168.26.5 Invalid 这也将表明有效用户和组正在通过设备进行身份验证。受影响的版本包括:在SRX系列设备上运行的Juniper Networks Junos OS 12.3X48,版本12.3X48-D30及更早版本,但在12.3X48-D35或更高版本不受影响;在SRX系列设备上运行的15.1X49,版本15.1X49-D40及更早版本,但在15.1X49-D50或更高版本不受影响。运行任何版本的Junos OS 12.1X46或12.1X47的设备不受此问题影响。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
SRX Series: Hardcoded credentials in Integrated UserFW feature.
漏洞描述信息
The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security review of the UserFW services authentication API, hardcoded credentials were identified and removed which can impact both the SRX Series device, and potentially LDAP and Active Directory integrated points. An attacker may be able to completely compromise SRX Series devices, as well as Active Directory servers and services. When Active Directory is compromised, it may allow access to user credentials, workstations, servers performing other functions such as email, database, etc. Inter-Forest Active Directory deployments may also be at risk as the attacker may gain full administrative control over one or more Active Directories depending on the credentials supplied by the administrator of the AD domains and SRX devices performing integrated authentication of users, groups and devices. To identify if your device is potentially vulnerable to exploitation, check to see if the service is operating; from CLI review the following output: root@SRX-Firewall# run show services user-identification active-directory-access domain-controller status extensive A result of "Status: Connected" will indicate that the service is active on the device. To evaluate if user authentication is occurring through the device: root@SRX-Firewall# run show services user-identification active-directory-access active-directory-authentication-table all Next review the results to see if valid users and groups are returned. e.g. Domain: juniperlab.com Total entries: 3 Source IP Username groups state 172.16.26.1 administrator Valid 192.168.26.2 engg01 engineers Valid 192.168.26.3 guest01 guests Valid Domain: NULL Total entries: 8 Source IP Username groups state 192.168.26.4 Invalid 192.168.26.5 Invalid This will also indicate that Valid users and groups are authenticating through the device. Affected releases are Juniper Networks Junos OS 12.3X48 from 12.3X48-D30 and prior to 12.3X48-D35 on SRX series; 15.1X49 from 15.1X49-D40 and prior to 15.1X49-D50 on SRX series. Devices on any version of Junos OS 12.1X46, or 12.1X47 are unaffected by this issue.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Juniper SRX Series设备Junos OS 安全漏洞
漏洞描述信息
Juniper SRX Series devices是美国瞻博网络(Juniper Networks)公司的一个SRX系列网关设备。Junos OS是使用在其中的操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper SRX Series设备上的Junos OS 12.3X48版本和15.1X49版本存在安全漏洞。远程攻击者可利用该漏洞获取目标系统的访问权限,并控制系统。
CVSS信息
N/A
漏洞类别
信任管理问题