Knowledge Search


×
 

2017-07 Security Bulletin: Junos OS: SRX Series: Cluster configuration synch failures occur if the root user account is locked out (CVE-2017-10604)

  [JSA10806] Show Article Properties


Product Affected:
This issue affects Junos OS 12.1X46, 12.3X48, 15.1X49. Affected platforms: SRX series.
Problem:

When the device is configured to perform account lockout with a defined period of time, any unauthenticated user attempting to log in as root with an incorrect password can trigger a lockout of the root account. When an SRX Series device is in cluster mode, and a cluster sync or failover operation occurs, then there will be errors associated with synch or failover while the root account is locked out.

Administrators can confirm if the root account is locked out via the following command

root@device> show system login lockout user root
User Lockout start Lockout end
root 1995-01-01 01:00:01 PDT 1995-11-01 01:31:01 PDT

This issue only affects devices configured to perform account lockout with a defined period of time; e.g.:

set system services ssh root-login deny
set system login retry-options tries-before-disconnect 5
set system login retry-options minimum-time 30
set system login retry-options lockout-period 30

The root lockout feature is working as expected. It is only a problem when an SRX Series device is in a cluster configuration mode.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue has been assigned CVE-2017-10604.

Solution:

The following software releases have been updated to resolve this specific issue: 12.1X46-D65, 12.3X48-D45, 15.1X49-D75, and all subsequent releases.

NOTE: Future SRX-Series releases above 15.1X49 Top of Tree from Junos OS 17.2R1 onward have been proactively resolved.

This issue is being tracked as PR 1222250 and is visible on the Customer Support website.

Workaround:

The lockout feature does not impact console access for the root account. Administrators may login via console, and block the offending incoming traffic which is causing the root account from being locked out via SSH connection attempts to restore cluster sync services from erroring or failing.

Administrators may block the offending SSH traffic from an upstream device.

Use access lists or firewall filters to limit access to the device only from trusted administrative hosts, networks and users.

Implementation:
Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request.
Modification History:
  • 2017-07-12: Initial Publication.
Related Links:
CVSS Score:
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Risk Level:
Medium
Risk Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."