Lucene search

K
nessusThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.JUNIPER_JSA10942.NASL
HistoryMar 25, 2020 - 12:00 a.m.

Junos OS Firewall Filters Failure Vulnerability (JSA10942)

2020-03-2500:00:00
This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
17

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

36.0%

The version of Junos OS installed on the remote host is EX3400 Series running Junos OS prior to 14.1X53-D115, 17.1R3, 17.2R3-S2, 17.3R3-S3, 17.4R2-S5, 18.1R3-S1, 18.2R2, or 18.3R2. It is, therefore, affected by a vulnerability. When a firewall filter is applied on the loopback interface, other firewall filters might stop working for multicast traffic. The command ‘show firewall filter’ can be used to confirm whether the filter is working. as referenced in the JSA10942 advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(134893);
  script_version("1.5");
  script_set_attribute(attribute:"plugin_modification_date", value:"2020/10/14");

  script_cve_id("CVE-2019-0048");
  script_xref(name:"JSA", value:"JSA10942");

  script_name(english:"Junos OS Firewall Filters Failure Vulnerability (JSA10942)");
  script_summary(english:"Checks the Junos version and build date.");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The version of Junos OS installed on the remote host is EX3400 Series running Junos OS prior to 14.1X53-D115, 17.1R3, 
17.2R3-S2, 17.3R3-S3, 17.4R2-S5, 18.1R3-S1, 18.2R2, or 18.3R2. It is, therefore, affected by a vulnerability. When a 
firewall filter is applied on the loopback interface, other firewall filters might stop working for multicast traffic. 
The command 'show firewall filter' can be used to confirm whether the filter is working. as referenced in the JSA10942
advisory. 

Note that Nessus has not tested for this issue but has instead relied only on the application's 
self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://kb.juniper.net/JSA10942");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant Junos software release referenced in Juniper advisory JSA10942");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0048");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/07/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/07/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/25");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:junos");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Junos Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("junos_version.nasl");
  script_require_keys("Host/Juniper/JUNOS/Version", "Host/Juniper/model");

  exit(0);
}

include('junos.inc');
include('misc_func.inc');
include('junos_kb_cmd_func.inc');

ver = get_kb_item_or_exit('Host/Juniper/JUNOS/Version');
fixes = make_array();

model = get_kb_item_or_exit('Host/Juniper/model');
if ( 'EX43' >!< model)
  audit(AUDIT_INST_VER_NOT_VULN, 'Junos', ver);
  
fixes['14.1X53'] = '14.1X53-D115';
fixes['17.1'] = '17.1R3';
fixes['17.2'] = '17.2R3-S2';
fixes['17.3'] = '17.3R3-S3';
fixes['17.4'] = '17.4R2-S5';
fixes['18.1'] = '18.1R3-S1';
fixes['18.2'] = '18.2R2';
fixes['18.3'] = '18.3R2';

fix = check_junos(ver:ver, fixes:fixes, exit_on_fail:TRUE);

# If it has only TCAM optimization enabled:
override = TRUE;
buf = junos_command_kb_item(cmd:'show configuration | display set');
if (buf)
{
  override = FALSE;
  pattern = "^set system packet-forwarding-options tcam-group-optimization";
  if (!junos_check_config(buf:buf, pattern:pattern))
    audit(AUDIT_HOST_NOT, 'vulnerable');
}
junos_report(ver:ver, fix:fix, override:override, severity:SECURITY_WARNING);
VendorProductVersionCPE
juniperjunoscpe:/o:juniper:junos

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

36.0%

Related for JUNIPER_JSA10942.NASL