First published: Tue Oct 19 2021(Updated: )
An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Session and Resource Control | <4.130r6 |
A hotfix has been created to resolve this issue. Contact Juniper Networks Technical Support to request the hotfix. Weak ciphers are now disabled by default. Only the following ciphers and key-exchange (KEX) algorithms are now enabled by default: • Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com • KEX Algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 Note: After upgrading to a fixed release, any manually configured weak ciphers or KEX algorithms for NETCONF will be retained. Administrators should reset their cipher configuration by typing: root@src# delete system services netconf ssh root@src# commit Stopping NETCONF/SSH: commit complete. root@src# set system services netconf ssh
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.