Juniper routers vulnerable to attacks

By sending a custom-built transmission control protocol (TCP) packet to a listening port on a Juniper Routing Engine, an attacker can make the kernel of Junos crash and case routers to switch over or reboot, according to technicians at Juniper Networks.

The flaw in Juniper’s router operating system, which affects older versions of the Juno software released before January 17, was uncovered during an internal routing product testing.

In a statement today, Juniper said it has not heard that the vulnerability is being exploited and that fixes to the flaw for affected platforms are available.

The company also advised administrators to implement source address anti-spoofing to prevent transmissions from bogus from reaching devices.


6 nasty Internet routing attacks
Application-targeted DDoS attacks increasing

Unicast reverse path forwarding can be done to reduce the risks of attacks. This method involves checking if the IP address in a packet is reachable. If the address could not be reached, the packet is dropped.

Other security measures include using RFC 3682 time-to-live security as well as implementing access lists or firewall filters for routers.

Read the whole story here


Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Article

ADaPT connects employers with highly skilled young workers

Help wanted. That’s what many tech companies across Canada are saying, and research shows that as the demand for skilled workers...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now