
Juniper has released out-of-band updates to address high-severity flaws in SRX Series and EX Series that could be exploited by a threat actor to take control of susceptible systems.
The vulnerabilities, tracked as CVE-2024-21619 and CVE-2024-21620, are rooted in the J-Web component and impact all versions of Junos OS.
The first vulnerability is CVE-2024-21619 with a CVSS score. 5.3 is a missing authentication vulnerability that could lead to exposure to sensitive configuration information
The second vulnerability is CVE-2024-21620 with a CVSS score: 8.8 is a cross-site scripting (XSS) vulnerability that could lead to the execution of arbitrary commands with target’s permissions by means of a crafted request
Bith the vulnerabilities have been addressed in the following versions –
- CVE-2024-21619 – 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases
- CVE-2024-21620 – 20.4R3-S10, 21.2R3-S8, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3-S1, 23.2R2, 23.4R2, and all subsequent releases

