Support Support Downloads Knowledge Base Service Request Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

2019-10 Security Bulletin: Junos OS: EX2300, EX3400 Series: Veriexec signature checking not enforced in specific versions of Junos OS (CVE-2019-0071)

0

0

Article ID: JSA10978 SECURITY_ADVISORIES Last Updated: 09 Oct 2019Version: 3.0
Product Affected:
This issue affects Junos OS 18.1R3-S4, 18.3R1-S3. Affected platforms: EX2300, EX2300-C, EX3400.
Problem:

Veriexec is a kernel-based file integrity subsystem in Junos OS that ensures only authorized binaries are able to be executed. Due to a flaw in specific versions of Junos OS, affecting specific EX Series platforms, the Veriexec subsystem will fail to initialize, in essence disabling file integrity checking. This may allow a locally authenticated user with shell access to install untrusted executable images, and elevate privileges to gain full control of the system.

During the installation of an affected version of Junos OS are installed, the following messages will be logged to the console:

Initializing Verified Exec:
/sbin/veriexec: Undefined symbol "__aeabi_uidiv"
/sbin/veriexec: Undefined symbol "__aeabi_uidiv"
/sbin/veriexec: Undefined symbol "__aeabi_uidiv"
veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/brcm-hr3.dtb: Authentication error
veriexec: /.mount/packages/db/os-kernel-prd-arm-32-20190221.70c2600_builder_stable_11/boot/contents.izo: Authentication error

...


This issue affects Juniper Networks Junos OS:

  • 18.1R3-S4 on EX2300, EX2300-C and EX3400;
  • 18.3R1-S3 on EX2300, EX2300-C and EX3400.


This issue was found during internal product security testing or research.

This issue has been assigned CVE-2019-0071.
 

Solution:

The following software releases have been updated to resolve this specific issue: Junos OS: 18.1R3-S5, 18.3R1-S4, and all subsequent releases.

Note: Juniper SIRT's policy is not to evaluate releases which are beyond End of Engineering (EOE) or End of Life (EOL).
 

Workaround:

To reduce the risk of exploitation of this vulnerability, customers should limit access to the Junos shell to only trusted administrators. However, Juniper Networks strongly recommends upgrading to an updated release of Junos OS to resolve this issue.
 

Implementation:
Software Releases, patches and updates are available at https://www.juniper.net/support/downloads/.
 
Modification History:
  • 2019-10-09: Initial Publication.
CVSS Score:
7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Severity Level:
High
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Security Alerts and Vulnerabilities

Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search