Knowledge Search


×
 

2019-01 Security Bulletin: Junos OS: OpenSSL Security Advisories [16 Apr 2018] and [12 June 2018]

  [JSA10919] Show Article Properties


Product Affected:
These issues affect all products and platforms running Junos OS.
Problem:

The ‚ÄčOpenSSL project has published security advisories for vulnerabilities resolved in the OpenSSL library on April 16, 2018, and June 12, 2018. The following is a summary of these vulnerabilities and their status with respect to Juniper products:

Affected releases are Juniper Networks Junos OS:

  • 12.3X48 versions prior to 12.3X48-D77, 12.3X48-D80;
  • 15.1 versions prior to 15.1F6-S12, 15.1R7-S3;
  • 15.1X49 versions prior to 15.1X49-D160;
  • 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D495, 15.1X53-D590, 15.1X53-D68;
  • 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S3;
  • 16.1X65 versions prior to 16.1X65-D49;
  • 16.2 versions prior to 16.2R2-S8;
  • 17.1 versions prior to 17.1R2-S10, 17.1R3;
  • 17.2 versions prior to 17.2R1-S7, 17.2R3;
  • 17.3 versions prior to 17.3R3-S2, 17.3R4;
  • 17.4 versions prior to 17.4R1-S6, 17.4R2-S2;
  • 18.1 versions prior to 18.1R2-S4, 18.1R3-S1;
  • 18.2 versions prior to 18.2R1-S4, 18.2R2;
  • 18.3 versions prior to 18.3R1-S1, 18.3R2.
     
CVE CVSS Summary
CVE-2018-0732 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2018-0737 5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
 

 
Solution:

The following software releases have been updated to resolve this specific issue: Junos OS 12.3X48-D77, 15.1F6-S12, 15.1R7-S3, 15.1X49-D160, 15.1X53-D236, 15.1X53-D495, 15.1X53-D590, 15.1X53-D68, 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S3, 16.1X65-D49, 16.2R2-S8, 17.1R2-S10, 17.1R3, 17.2R1-S7, 17.2R3, 17.3R3-S2, 17.3R4, 17.4R1-S6, 17.4R2-S2, 18.1R2-S4, 18.1R3-S1, 18.2R1-S4, 18.2R2, 18.3R1-S1, 18.3R2, 18.4R1, and all subsequent releases.

This issue is being tracked as PR 1380686 which is visible on the Customer Support website.
 

Workaround:

Since SSL is used for remote network configuration and management applications such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for this issue in Junos may include:

  • Disabling J-Web
  • Disable SSL service for JUNOScript and only use Netconf, which makes use of SSH, to make configuration changes
  • Limit access to J-Web and XNM-SSL from only trusted networks
Implementation:
Software Releases, patches and updates are available at https://www.juniper.net/support/downloads/.
 
Modification History:
2019-01-09: Initial publication

Related Links:
CVSS Score:
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Risk Level:
High
Risk Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."