On October,12,2023, Juniper Networks, a manufacturer of networking equipment, made an announcement regarding the release of patches to address over 30 vulnerabilities found in both Junos OS and Junos OS Evolved. This set of vulnerabilities includes nine high-severity issues, with the most critical being an incorrect default permissions flaw, identified as CVE-2023-44194. This particular vulnerability allows an unauthenticated attacker with local access to a vulnerable device to establish a backdoor with root privileges. The root cause of this issue is the improper permissions associated with a specific system directory. In addition to addressing the aforementioned critical flaw, Juniper's patches also target six high-severity vulnerabilities in Junos OS and Junos OS Evolved, capable of causing denial of service. Notably, five of these vulnerabilities can be exploited remotely without requiring authentication. Furthermore, two other high-severity vulnerabilities impact both Junos OS and Junos OS Evolved; one affects the stability of devices, while the other jeopardizes the confidentiality and integrity of device operations. The rest of the vulnerabilities addressed in these updates are of medium severity and could lead to various issues, such as denial of service conditions, bypassing intended access restrictions, impacting system and network integrity, affecting system availability, leaking credentials, disclosing configuration changes, suffering from DMA memory leaks, or incorrectly forwarding MAC addresses. Additionally, Juniper Networks has also released patches to address a series of medium-severity vulnerabilities in third-party software used within Junos OS and Junos OS Evolved. These vulnerabilities encompass issues related to NTP (Network Time Protocol) and cryptographic algorithms. The manufacturer has made software updates available to resolve these vulnerabilities for various versions of Junos OS and Junos OS Evolved, ranging from 20.4 to 23.3. Importantly, Juniper Networks has not reported any instances of these vulnerabilities being exploited in malicious attacks.
The ShadowRay 2.0 campaign is a large-scale attack operation targeting publicly exposed Ray AI clusters worldwide. Threat actors are exploiting the long-standing unauthenticated jo...
Security researchers uncovered a long-running malicious campaign hiding inside free VPN and ad-blocking Chrome extensions that promised privacy but instead enabled full browser-lev...
Fortinet has issued an urgent advisory for a critical vulnerability, CVE-2025-58034 in its FortiWeb, which is seeing active in-the-wild exploitation. The vulnerability has been cla...