Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router
Summary
Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Juniper Networks has released an out-of-cycle security update addressing one critical authentication bypass using an alternate path or channel vulnerability, which has a CVSSv4 score of 10.0. This vulnerability affects Juniper Networks Session Smart Router or Conductor running with a redundant peer configuration. An authenticated, remote attacker could exploit this vulnerability to bypass authentication and take full control of the device.
Remediation advice
Affected organisations are encouraged to review Juniper Networks out-of-cycle security bulletin: "Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed (CVE-2024-2973)" Article ID JSA83126 and apply any relevant security updates.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 1 July 2024 1:54 pm