CVE-2017-2343

10.0 CRITICAL

📋 TL;DR

CVE-2017-2343 is a critical vulnerability in Juniper SRX Series firewalls with Integrated User Firewall (UserFW) feature that involves hardcoded credentials in the authentication API. This allows attackers to completely compromise SRX devices and potentially gain administrative control over integrated Active Directory servers. Affected systems include SRX Series devices running specific vulnerable Junos OS versions with UserFW enabled.

💻 Affected Systems

Products:
  • Juniper SRX Series
Versions: Junos OS 12.3X48 from 12.3X48-D30 to prior to 12.3X48-D35; 15.1X49 from 15.1X49-D40 to prior to 15.1X49-D50
Operating Systems: Junos OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Integrated User Firewall (UserFW) feature is enabled and configured for Active Directory/LDAP integration. Versions 12.1X46 and 12.1X47 are unaffected.

📦 What is this software?

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SRX firewall and administrative takeover of integrated Active Directory domains, leading to credential theft, lateral movement across enterprise networks, and compromise of email, database, and other critical services.

🟠

Likely Case

SRX device compromise leading to firewall policy bypass, network traffic interception, and potential access to integrated authentication systems.

🟢

If Mitigated

Limited impact if UserFW feature is disabled or proper network segmentation isolates SRX devices from critical infrastructure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hardcoded credentials make exploitation straightforward if the vulnerable service is accessible. No authentication required to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Junos OS 12.3X48-D35 or later; 15.1X49-D50 or later

Vendor Advisory: https://kb.juniper.net/JSA10791

Restart Required: Yes

Instructions:

1. Download appropriate Junos OS version from Juniper support portal. 2. Upload to SRX device. 3. Install using 'request system software add' command. 4. Reboot device after installation.

🔧 Temporary Workarounds

Disable UserFW Feature

all

Temporarily disable the Integrated User Firewall feature to eliminate the vulnerability

delete security user-identification

Restrict Access to UserFW Service

all

Apply firewall policies to restrict network access to the UserFW authentication service

set security zones security-zone trust host-inbound-traffic system-services user-identification

🧯 If You Can't Patch

  • Immediately disable the Integrated User Firewall feature if not required
  • Implement strict network segmentation to isolate SRX devices from Active Directory servers and other critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Run: show services user-identification active-directory-access domain-controller status extensive. If status shows 'Connected', check version with: show version

Check Version:

show version | match Junos

Verify Fix Applied:

Verify Junos OS version is 12.3X48-D35+ or 15.1X49-D50+ using: show version

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to UserFW API
  • Unexpected authentication events from SRX to Active Directory
  • Changes to firewall policies or user authentication rules

Network Indicators:

  • Unusual traffic patterns from SRX to Active Directory servers
  • Authentication requests from unexpected sources to UserFW service

SIEM Query:

source="SRX-Firewall" AND (event="user-identification" OR event="active-directory-access") AND status="Connected"

🔗 References

📤 Share & Export