Developers: | Juniper Networks |
Technology: | IS - Antispam, IS - Firewalls |
Content |
Juniper SRX240
The SRX240 Security Gateway provides routing security and supports firewalls up to 1.5 Gbps, 250 Mbps IPsec VPN, and 250 Mbps IPS. The device is equipped with additional security features, including Unified Threat Protection (UTM), including intrusion prevention system (IPS), virus and spam filters, and web filtering. The SRX240 gateway is an optimal solution for protecting branches in distributed corporate networks.
2023: Recognizing OS and device vulnerabilities. Hackers use this in DDoS attacks
On August 29, 2023, the American company Juniper Networks, a manufacturer of equipment for Internet providers, corporations and the public sector, announced the identification of a number of vulnerabilities in its network devices. Holes allow cybercriminals to organize DDoS attacks.
The problems concern the Junos OS and Junos OS Evolved operating systems. Juniper Networks SRX series firewalls and EX family switches are affected. The vulnerabilities are related to the implementation of the Border Gateway (BGP) protocol, which is used to route Internet traffic. BGP, along with DNS, is one of the main mechanisms that ensure the functioning of the World Wide Network. It is said that an attacker can remotely organize a DDoS attack by repeatedly sending messages compiled in a certain way to vulnerable equipment.
Another flaw has been identified in the J-Web interface. In this case, unauthenticated cybercriminals can exploit a vulnerability to remotely execute arbitrary program code. By the end of August 2023, attempts were recorded to conduct attacks through this hole. Juniper Networks has released the necessary fixes and strongly recommends downloading them to all users of the named products.
A warning about vulnerabilities in Juniper Networks equipment was also issued by the US Cybersecurity and Infrastructure Protection Agency (CISA). It is noted that Juniper Networks devices are used by about 30 thousand enterprises around the world, as well as hundreds of federal, state and local government institutions and higher educational institutions. Therefore, the exploitation of holes in this equipment can have extremely negative consequences, including failures in the operation of network services and significant financial losses.[1]