First published: Thu Apr 22 2021(Updated: )
The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device management services. This issue affects: Juniper Networks Junos OS on cSRX Series: All versions prior to 20.2R3; 20.3 versions prior to 20.3R2; 20.4 versions prior to 20.4R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =20.2-r1 | |
Juniper JUNOS | =20.2-r1-s1 | |
Juniper JUNOS | =20.2-r1-s2 | |
Juniper JUNOS | =20.2-r1-s3 | |
Juniper JUNOS | =20.3-r1 | |
Juniper JUNOS | =20.3-r1-s1 | |
Juniper JUNOS | =20.4-r1 | |
Juniper JUNOS | =20.4-r1-s1 | |
Juniper Csrx |
The following software releases have been updated to resolve this specific issue: 20.2R3, 20.3R2, 20.4R2, 21.1R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-0266 refers to a vulnerability in cSRX Series software in Juniper Networks Junos OS that allows an attacker to take control of any instance of a cSRX deployment through device management services.
CVE-2021-0266 affects all versions of Juniper Networks Junos OS on cSRX Series prior to 20.2R...
The severity of CVE-2021-0266 is rated as critical, with a severity value of 9.8.
An attacker can exploit CVE-2021-0266 by taking advantage of the multiple hard-coded cryptographic keys in the cSRX Series software.
No, Juniper Csrx is not affected by CVE-2021-0266.