Advisory Details

August 27th, 2014

Juniper Network and Security Manager XDB Remote Code Execution Vulnerability

ZDI-14-297
ZDI-CAN-2151

CVE ID CVE-2014-3411
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Juniper
AFFECTED PRODUCTS Network and Security Manager
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['13614']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Juniper Network and Security Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the XDB service. The issue lies in the ability to connect to the service with a remote debugger. An attacker can leverage this vulnerability to execute code under the context of the Java service, which can then be used in conjunction with a privilege escalation vulnerability to gain root privileges.

ADDITIONAL DETAILS Juniper has issued an update to correct this vulnerability. More details can be found at:
http://kb.juniper.net/JSA10625
DISCLOSURE TIMELINE
  • 2014-02-18 - Vulnerability reported to vendor
  • 2014-08-27 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES