techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#junosos

0 posts0 participants0 posts today
Security Land<p>According to Mandiant, the attackers distributed customized malicious code exploiting Juniper routers, expanding their attack surface from edge devices to internal infrastructure.</p><p><a href="https://mastodon.social/tags/securityland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityland</span></a> <a href="https://mastodon.social/tags/cyberwatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberwatch</span></a> <a href="https://mastodon.social/tags/china" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>china</span></a> <a href="https://mastodon.social/tags/junosos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>junosos</span></a> <a href="https://mastodon.social/tags/mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mandiant</span></a> <a href="https://mastodon.social/tags/juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>juniper</span></a> <a href="https://mastodon.social/tags/router" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>router</span></a> <a href="https://mastodon.social/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a></p><p><a href="https://www.security.land/chinese-hacking-group-linked-to-junos-os-security-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.land/chinese-hacking-</span><span class="invisible">group-linked-to-junos-os-security-breach/</span></a></p>
Pyrzout :vm:<p>Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers – Source: www.securityweek.com <a href="https://ciso2ciso.com/mandiant-uncovers-custom-backdoors-on-end-of-life-juniper-routers-source-www-securityweek-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/mandiant-uncover</span><span class="invisible">s-custom-backdoors-on-end-of-life-juniper-routers-source-www-securityweek-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://social.skynetcloud.site/tags/securityweekcom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityweekcom</span></a> <a href="https://social.skynetcloud.site/tags/securityweek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityweek</span></a> <a href="https://social.skynetcloud.site/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://social.skynetcloud.site/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://social.skynetcloud.site/tags/Mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mandiant</span></a> <a href="https://social.skynetcloud.site/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://social.skynetcloud.site/tags/JunosOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JunosOS</span></a> <a href="https://social.skynetcloud.site/tags/UNC3886" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UNC3886</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p>
Pyrzout :vm:<p>Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers <a href="https://www.securityweek.com/mandiant-uncovers-custom-backdoors-on-end-of-life-juniper-routers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/mandiant-unco</span><span class="invisible">vers-custom-backdoors-on-end-of-life-juniper-routers/</span></a> <a href="https://social.skynetcloud.site/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://social.skynetcloud.site/tags/Nation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nation</span></a>-State <a href="https://social.skynetcloud.site/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://social.skynetcloud.site/tags/Mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mandiant</span></a> <a href="https://social.skynetcloud.site/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://social.skynetcloud.site/tags/JunosOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JunosOS</span></a> <a href="https://social.skynetcloud.site/tags/UNC3886" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UNC3886</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p>
Pyrzout :vm:<p>Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers <a href="https://www.securityweek.com/mandiant-uncovers-custom-backdoors-on-end-of-life-juniper-routers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/mandiant-unco</span><span class="invisible">vers-custom-backdoors-on-end-of-life-juniper-routers/</span></a> <a href="https://social.skynetcloud.site/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://social.skynetcloud.site/tags/Nation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nation</span></a>-State <a href="https://social.skynetcloud.site/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://social.skynetcloud.site/tags/Mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mandiant</span></a> <a href="https://social.skynetcloud.site/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://social.skynetcloud.site/tags/JunosOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JunosOS</span></a> <a href="https://social.skynetcloud.site/tags/UNC3886" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UNC3886</span></a> <a href="https://social.skynetcloud.site/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a></p>
Redhotcyber<p>RCE da 9,8 su Juno OS di Juniper Networks serie SRX/EX che consente privilegi root</p><p>Una <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilità</span></a> di <a href="https://mastodon.bida.im/tags/scrittura" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scrittura</span></a> fuori dal limite in J-Web di <a href="https://mastodon.bida.im/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://mastodon.bida.im/tags/Networks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networks</span></a> <a href="https://mastodon.bida.im/tags/JunosOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JunosOS</span></a> serie <a href="https://mastodon.bida.im/tags/SRX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SRX</span></a> e serie <a href="https://mastodon.bida.im/tags/EX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EX</span></a> consente a un utente <a href="https://mastodon.bida.im/tags/malintenzionato" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malintenzionato</span></a> non autenticato basato sulla rete di provocare un Denial of Service (<a href="https://mastodon.bida.im/tags/DoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoS</span></a>) o un’esecuzione di codice remoto (<a href="https://mastodon.bida.im/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a>) e ottenere i privilegi di <a href="https://mastodon.bida.im/tags/root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>root</span></a> sul dispositivo.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/rce-da-98-su-juno-os-di-juniper-networks-serie-srx-ex-che-consente-privilegi-root/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/rce-da-98</span><span class="invisible">-su-juno-os-di-juniper-networks-serie-srx-ex-che-consente-privilegi-root/</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Juniper Firewalls Under Siege: Over 12,000 Vulnerable Devices Exposed! 🔥"</p><p>New research reveals nearly 12,000 internet-facing Juniper firewall devices are susceptible to a recently disclosed remote code execution flaw. The vulnerability, identified as CVE-2023-36845, allows an unauthenticated remote attacker to execute arbitrary code without creating a file on the system. This medium-severity flaw in the J-Web component of Junos OS can be weaponized by adversaries to control certain environment variables. Juniper Networks patched this alongside other vulnerabilities last month. A proof-of-concept (PoC) exploit by watchTowr combined CVE-2023-36846 and CVE-2023-36845 to upload malicious PHP files and achieve code execution. Jacob Baines points out, "Firewalls are interesting targets to APT as they help bridge into the protected network and can serve as useful hosts for C2 infrastructure." Juniper has acknowledged the vulnerability but is unaware of any successful exploits against its customers. However, they've detected exploitation attempts in the wild, urging users to apply necessary patches. 🛡️</p><p>Source: <a href="https://thehackernews.com/2023/09/over-12000-juniper-firewalls-found.html" rel="nofollow noopener" target="_blank">The Hacker News</a></p><p>Tags: <a href="https://infosec.exchange/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://infosec.exchange/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE202336845" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202336845</span></a> <a href="https://infosec.exchange/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://infosec.exchange/tags/JunosOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JunosOS</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatLandscape</span></a> 🌐🔐🔍</p>