8.8
CWE
79
EPSS
0.046%
Advisory Published
Updated

CVE-2024-21620: Junos OS: SRX Series and EX Series: J-Web doesn't sufficiently sanitize input to prevent XSS

First published: Thu Jan 25 2024(Updated: )

An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an attacker to construct a URL that when visited by another user enables the attacker to execute commands with the target's permissions, including an administrator. A specific invocation of the emit_debug_note method in webauth_operation.php will echo back the data it receives. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S10; * 21.2 versions earlier than 21.2R3-S8; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3-S1; * 23.2 versions earlier than 23.2R2; * 23.4 versions earlier than 23.4R2.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
All of
Any of
Juniper Junos<20.4
Juniper Junos=20.4
Juniper Junos=20.4-r1
Juniper Junos=20.4-r1-s1
Juniper Junos=20.4-r2
Juniper Junos=20.4-r2-s1
Juniper Junos=20.4-r2-s2
Juniper Junos=20.4-r3
Juniper Junos=20.4-r3-s1
Juniper Junos=20.4-r3-s2
Juniper Junos=20.4-r3-s3
Juniper Junos=20.4-r3-s4
Juniper Junos=20.4-r3-s5
Juniper Junos=20.4-r3-s6
Juniper Junos=20.4-r3-s7
Juniper Junos=20.4-r3-s8
Juniper Junos=20.4-r3-s9
Juniper Junos=21.2
Juniper Junos=21.2-r1
Juniper Junos=21.2-r1-s1
Juniper Junos=21.2-r1-s2
Juniper Junos=21.2-r2
Juniper Junos=21.2-r2-s1
Juniper Junos=21.2-r2-s2
Juniper Junos=21.2-r3
Juniper Junos=21.2-r3-s1
Juniper Junos=21.2-r3-s2
Juniper Junos=21.2-r3-s3
Juniper Junos=21.2-r3-s4
Juniper Junos=21.2-r3-s5
Juniper Junos=21.2-r3-s6
Juniper Junos=21.2-r3-s7
Juniper Junos=21.4
Juniper Junos=21.4-r1
Juniper Junos=21.4-r1-s1
Juniper Junos=21.4-r1-s2
Juniper Junos=21.4-r2
Juniper Junos=21.4-r2-s1
Juniper Junos=21.4-r2-s2
Juniper Junos=21.4-r3
Juniper Junos=21.4-r3-s1
Juniper Junos=21.4-r3-s2
Juniper Junos=21.4-r3-s3
Juniper Junos=21.4-r3-s4
Juniper Junos=21.4-r3-s5
Juniper Junos=22.1
Juniper Junos=22.1-r1
Juniper Junos=22.1-r1-s1
Juniper Junos=22.1-r1-s2
Juniper Junos=22.1-r2
Juniper Junos=22.1-r2-s1
Juniper Junos=22.1-r2-s2
Juniper Junos=22.1-r3
Juniper Junos=22.1-r3-s1
Juniper Junos=22.1-r3-s2
Juniper Junos=22.1-r3-s3
Juniper Junos=22.1-r3-s4
Juniper Junos=22.2
Juniper Junos=22.2-r1
Juniper Junos=22.2-r1-s1
Juniper Junos=22.2-r1-s2
Juniper Junos=22.2-r2
Juniper Junos=22.2-r2-s1
Juniper Junos=22.2-r2-s2
Juniper Junos=22.2-r3
Juniper Junos=22.2-r3-s1
Juniper Junos=22.2-r3-s2
Juniper Junos=22.3
Juniper Junos=22.3-r1
Juniper Junos=22.3-r1-s1
Juniper Junos=22.3-r1-s2
Juniper Junos=22.3-r2
Juniper Junos=22.3-r2-s1
Juniper Junos=22.3-r2-s2
Juniper Junos=22.3-r3
Juniper Junos=22.3-r3-s1
Juniper Junos=22.4
Juniper Junos=22.4-r1
Juniper Junos=22.4-r1-s1
Juniper Junos=22.4-r1-s2
Juniper Junos=22.4-r2
Juniper Junos=22.4-r2-s1
Juniper Junos=22.4-r2-s2
Juniper Junos=22.4-r3
Juniper Junos=23.2
Juniper Junos=23.2-r1
Juniper Junos=23.2-r1-s1
Juniper Junos=23.2-r1-s2
Juniper Junos=23.4-r1
Any of
Juniper EX Redundant Power System
Juniper EX Series
Juniper EX2200
Juniper EX2200
Juniper EX2200
Juniper EX2300-24T
Juniper EX2300 Multigigabit
Juniper EX2300-24P
Juniper EX2300-24T
Juniper EX2300-48MP
Juniper EX2300-48P
Juniper EX2300-48T
Juniper EX2300-C
Juniper EX2300 Multigigabit
Juniper EX2300
Juniper EX3200
Juniper EX3300
Juniper EX3300
Juniper EX3400
Juniper EX4100 Multigigabit
Juniper EX4100
Juniper EX4100 Multigigabit
Juniper EX4200
Juniper EX4200
Juniper EX4300-24T
Juniper EX4300-24P
Juniper EX4300
Juniper EX4300-24T-S
Juniper EX4300-24T-S
Juniper EX4300-32F
Juniper EX4300
Juniper EX4300-32F-S
Juniper EX4300-48MP
Juniper EX4300-48MP-S
Juniper EX4300-48P
Juniper EX4300-48P
Juniper EX4300-48T
Juniper EX4300-48T-AFI
Juniper EX4300-48T-DC
Juniper EX4300-48T-DC-AFI
Juniper EX4300-48T-S
Juniper EX4300-48TAFI
Juniper EX4300-48TDC
Juniper EX4300-48TDC-AFI
Juniper EX4300
Juniper EX4300
Juniper EX4300 Multigigabit
Juniper EX4300
Juniper EX4400
Juniper EX4400
Juniper EX4400 Multigigabit
Juniper EX4500
juniper ex4500-vc
Juniper EX4550
Juniper EX4550
Juniper EX4550
Juniper EX4600
Juniper EX4600
Juniper EX4650
Juniper EX6200
Juniper EX6210
Juniper EX8200
Juniper EX8200
Juniper EX8208
Juniper EX8216
Juniper EX9200
Juniper EX9204
Juniper EX9208
Juniper EX9214
Juniper EX9250
Juniper EX9251
Juniper EX9253
Juniper SRX100
Juniper SRX110
Juniper SRX1400
Juniper SRX1500
Juniper SRX1600
Juniper SRX210
Juniper SRX220
Juniper SRX2300
Juniper SRX240
Juniper SRX240H2
Juniper SRX240M
Juniper SRX300
Juniper SRX320
Juniper SRX340
Juniper SRX3400
Juniper SRX345
Juniper SRX3600
Juniper SRX380
Juniper SRX4000
Juniper SRX4100
Juniper SRX4200
Juniper SRX4300
Juniper SRX4600
Juniper SRX4700
Junos OS SRX 5000 Series
Juniper SRX5400
Juniper SRX550
Juniper SRX550
Juniper SRX550
juniper srx5600
Juniper SRX5800
Juniper SRX650
Juniper Networks Junos OS
Juniper SRX Series
Juniper Networks EX Series switch

Remedy

The following software releases have been updated to resolve this specific issue: 20.4R3-S10*, 21.2R3-S8*, 21.4R3-S6*, 22.1R3-S5*, 22.2R3-S3*, 22.3R3-S2*, 22.4R3-S1*, 23.2R2*, 23.4R2*, 24.2R1*, and all subsequent releases. * Pending Publication

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Peer vulnerabilities

(Found alongside the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of CVE-2024-21620?

    CVE-2024-21620 has a high severity rating due to its potential to allow cross-site scripting attacks.

  • How do I fix CVE-2024-21620?

    To remediate CVE-2024-21620, you should update the Junos OS on affected devices to the latest patched version provided by Juniper Networks.

  • Which versions of Junos OS are affected by CVE-2024-21620?

    CVE-2024-21620 affects several versions of Junos OS prior to the fixed releases, including versions up to 22.4.

  • What products are impacted by CVE-2024-21620?

    CVE-2024-21620 impacts Juniper Networks' SRX Series and EX Series devices running affected versions of Junos OS.

  • Is there a workaround for CVE-2024-21620?

    Currently, no known workarounds for CVE-2024-21620 are recommended apart from applying the security updates.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203