Protect your corporate IT network from hackers and other unwanted intruders with Proxy Sentinel™. Click here for all the details and get the peace of mind you deserve.
Back to our Homepage Proxy Sentinel™ high performance Internet proxy server and secure firewall solution Firewall Sentinel™ secure & powerful Internet firewall solution About Internet Security.ca and GCIS Frequently Asked Questions on Internet security issues Internet Security Industry News - Stay informed of what's happening Contact Internet Security.ca today and order your Proxy Sentinel™ or Firewall Sentinel™ server now!

Juniper Networks pinpoints its products that are vulnerable to the DROWN attack

Sponsered ads:
Read the latest IT news. Visit ItDirection.net. Updated several times daily.

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.

March 16, 2016

Juniper today has pinpointed some of its networking products it says are vulnerable to the so-called DROWN attack.

To be sure, DROWN raised its ugly head at the end of February, and is a relic of enduring but pointless support for the long-deprecated SSLv2 protocol.

The most prominent exposure to DROWN is in web sites that weren't configured to refuse attempts at SSLv2 connections.

But hardware vendors such as Juniper, Cisco and a few others use HTTPS to secure access to management consoles, which means the security vulnerabilities sent the whole industry scrambling to identify and patch weak systems.

In Juniper's security advisory, the company says its ScreenOS (the operating system for NetScreen firewalls), Security Threat Response Manager (STRM), its JSA virtual appliance, and its WLC Wireless LAN Controller all had the DROWN security vulnerability.

For ScreenOS later than version 6.3.0r19, the repair solution is very straightforward-- simply disable SSLv2 and SSLv3 at the command line interface with the 'ttl unset sll ssl3' command.

Juniper promises a fix for the STRM and JSA Series products in versions 2014.6.r4 and 2013.2.r14, and fixes are promised for other products. They should come soon we are told.

Listed as not as vulnerable are Junos OS, Junos Space, JunosE, QFabric Director, Standalone IDP (intrusion detection and prevention), NSM, WLAN RingMaster and WLAN SmartPass.

Networking system admins are warned that if they still have vulnerable products that don't yet have a fix, Juniper notes that SSL traffic can always be blocked at the firewall level.

Source: Juniper Networks.

Sponsered ads:
Read the latest IT news. Visit ItDirection.net. Updated several times daily.

If you need reliability when it comes to SMTP servers, get the best, get Port 587.

Get a powerful Linux Dual-Core dedicated server for less than $2.67 a day!

Share on Twitter.


Home | Proxy Sentinel™ | Firewall Sentinel™ | FAQ | News | Sitemap | Contact
Copyright © Internet Security.ca    Terms of use    Privacy agreement    Legal disclaimer