Learn about CVE-2021-31384, a vulnerability in Juniper SRX Series devices allowing unauthorized access to J-Web management services, its impact, affected versions, and mitigation steps.
A vulnerability exists in Juniper Networks Junos OS on SRX Series devices that allows an attacker to access J-Web management services from any interface, bypassing security settings.
Understanding CVE-2021-31384
This CVE describes a Missing Authorization weakness and Insufficient Granularity of Access Control affecting Juniper SRX Series devices.
What is CVE-2021-31384?
The vulnerability allows unauthorized access to J-Web administrative interfaces on Juniper SRX Series devices, irrespective of security configurations.
The Impact of CVE-2021-31384
The issue poses a high severity threat, with a CVSS base score of 7.2 (High), allowing attackers to bypass security measures.
Technical Details of CVE-2021-31384
The following minimal configuration is necessary:
[system services web-management http] or [system services web-management https]
Vulnerability Description
The vulnerability arises due to a Missing Authorization weakness and Insufficient Granularity of Access Control in Junos OS on SRX Series.
Affected Systems and Versions
Impacted versions include Juniper Networks Junos OS SRX Series 20.4 versions prior to 20.4R2-S1, 20.4R3, and 21.1 versions prior to 21.1R1-S1, 21.1R2.
Exploitation Mechanism
No known malicious exploitation has been reported by Juniper SIRT for this vulnerability.
Mitigation and Prevention
To address CVE-2021-31384:
Immediate Steps to Take
Juniper recommends updating to patched software releases: 20.4R2-S1, 20.4R3, 21.1R1-S1, 21.1R2, 21.2R1, or later versions.
Long-Term Security Practices
Regularly update Junos OS to the latest version, follow security best practices, and monitor for any unauthorized access.
Patching and Updates
Ensure timely installation of security patches and software updates to mitigate the risk of exploitation.