This issue affects Junos OS 15.1X49, 17.4, 18.1, 18.2, 18.3, 18.4, 19.1, 19.2, 19.3, 19.4, 20.1, 20.2. Affected platforms: SRX Series.
A vulnerability that allows an unauthenticated remote attacker to obtain access that would otherwise be denied in the Simple Authentication and Security Layer (SASL) implementation that is part of the OpenLDAP third party software package has been resolved in Juniper Networks SRX Series configured with Integrated User Firewall.
Integrated User Firewall collects user information through Lightweight Directory Access Protocol (LDAP), and by enforcing policies, access is allowed or denied.
This issue affects Juniper Networks Junos OS on SRX Series:
15.1X49 versions prior to 15.1X49-D230;
17.4 versions prior to 17.4R2-S12, 17.4R3-S3;
18.1 versions prior to 18.1R3-S11;
18.2 versions prior to 18.2R3-S6;
18.3 versions prior to 18.3R2-S4, 18.3R3-S3;
18.4 versions prior to 18.4R2-S5, 18.4R3-S4;
19.1 versions prior to 19.1R2-S2, 19.1R3-S2;
19.2 versions prior to 19.2R1-S5, 19.2R3;
19.3 versions prior to 19.3R2-S4, 19.3R3;
19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3;
20.1 versions prior to 20.1R1-S3, 20.1R2;
20.2 versions prior to 20.2R1-S1, 20.2R2.
This issue affects SRX Series platform configured with ldap-server profile for Integrated User Firewall.
The example of the config stanza affected by this issue:
[access profile <profile1> ldap-server]
in combination with:
[security policies from-zone <z1> to-zone <z2> policy <p1> permit firewall-authentication user-firewall access-profile <profile1>]
Please refer to https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-user-auth-configure-integrated-userfw.html for more details on the LDAP configuration of Integrated User Firewall.
Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
This issue was discovered during a external security research.
This issue has been assigned CVE-2019-13565.
The following software releases have been updated to resolve this specific issue Junos OS: 15.1X49-D230, 17.4R2-S12, 17.4R3-S3, 18.1R3-S11, 18.2R3-S6, 18.2X75-D34, 18.3R2-S4, 18.3R3-S3, 18.4R2-S5, 18.4R3-S4, 19.1R2-S2, 19.1R3-S2, 19.2R1-S5, 19.2R3, 19.3R2-S4, 19.3R3, 19.4R1-S3, 19.4R2-S2, 19.4R3, 20.1R1-S3, 20.1R2, 20.2R1-S1, 20.2R2, 20.3R1, and all subsequent releases.
This issue is being tracked as 1508253.
There are no viable workarounds for this issue.
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."