Product Affected:
This issue affects Junos OS
12.1X46. Affected platforms: SRX 210, 240, 650 series firewalls with
AX411 Wireless Access Points. This issue affects ScreenOS 6.3. Affected
platforms: ScreenOS SSG-5 and SSG-20 devices with embedded Wireless
Access Points radios. This issue affects WLAN 9.2, 9.6. Affected
platforms: MSS.
Problem:
A series of Wi-Fi
Protected Access (WPA/WPA1) and Wi-Fi Protected Access II (WPA2)
security protocols used in Juniper’s SRX 210, 240, 650 series firewalls
which support the AX411 Access Points, ScreenOS SSG-5 and SSG-20
firewalls with integrated WiFi radios, and lastly, the WLAN product line
have one or more vulnerabilities present when these Wi-Fi radios are
enabled.
This is a series of protocol level vulnerabilities and not specific
to any Juniper products. WPA and WPA2 security protocols are present in
nearly all modern Wi-Fi products.
Successful exploitation of these vulnerabilities could allow
unauthenticated attackers to perform packet replay, decrypt wireless
packets, and to potentially forge or inject packets into a wireless
network.
The following CVE IDs have been issued for each of the possible vulnerabilities:
CVE-2017-13077 reinstallation of the pairwise key in the Four-way handshake
CVE-2017-13078 reinstallation of the group key in the Four-way handshake
CVE-2017-13079 reinstallation of the integrity group key in the Four-way handshake
CVE-2017-13080 reinstallation of the group key in the Group Key handshake
CVE-2017-13081 reinstallation of the integrity group key in the Group Key handshake
Juniper's products do not support Fast BSS Transition Reassociation so are Not Vulnerable to CVE-2017-13082.
The following CVE IDs are still under investigation:
CVE-2017-13084 reinstallation of the STK key in the PeerKey handshake
CVE-2017-13086 reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake
CVE-2017-13087 reinstallation of the group key (GTK) when processing a
Wireless Network Management (WNM) Sleep Mode Response frame
CVE-2017-13088 reinstallation of the integrity group key (IGTK) when
processing a Wireless Network Management (WNM) Sleep Mode Response frame
The research paper referenced in the related links section below can be reviewed for details.
Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
This issue was discovered by an external security researcher.
No other Juniper Networks products or platforms are affected by this issue.
Solution:
WLAN
MSS 9.2.1, 9.6.5, and all subsequent releases.
This issue is being tracked as PR 1297300 and is visible on the Customer Support website.
Workaround:
There are no viable workarounds for these issues.
The following methods may be used to reduce the possibility of exploitation:
SRX 210, 240, 650 series firewalls with AX411 Wireless Access Points:
Disabling all Wi-Fi configurations and setting all ports with AX411
Access Points administratively down will protect the SRX device from
exploitation.
Customers may also physically disconnect the AX411 Wi-Fi Access Points from their network.
ScreenOS devices with embedded Wireless Access Points:
Disable all Wi-Fi configurations.
WLAN:
Disable all Wi-Fi Access Points until such time that the MSS can be upgraded.
Implementation:
Software Releases, patches and updates are available at
https://www.juniper.net/support/downloads/.
Modification History:
Modification History:
2017-10-16: Initial publication
CVSS Score:
7.9 (CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
Risk Assessment:
Information for how Juniper
Networks uses CVSS can be found at KB 16446 "Common Vulnerability
Scoring System (CVSS) and Juniper's Security Advisories."
Acknowledgements:
Juniper SIRT would like to acknowledge and thank
* researchers Mathy Vanhoef and Frank Piessens of DistriNet
(Distributed Systems and Computer Networks) at the Computer Science
department of the Katholieke Universiteit Leuven, Belgium for
responsibly disclosing these vulnerabilities.
* John A. Van Boxtel with Cyprus Semiconductor for finding that wpa_supplicant v2.6 is also vulnerable to CVE-2017-13077.
No comments:
Post a Comment