Skip to main content

Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router

Summary

Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router

Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

Juniper Networks has released an out-of-cycle security update addressing one critical authentication bypass using an alternate path or channel vulnerability, which has a CVSSv4 score of 10.0. This vulnerability affects Juniper Networks Session Smart Router or Conductor running with a redundant peer configuration. An authenticated, remote attacker could exploit this vulnerability to bypass authentication and take full control of the device.

Remediation advice

Affected organisations are encouraged to review Juniper Networks out-of-cycle security bulletin: "Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed (CVE-2024-2973)" Article ID JSA83126 and apply any relevant security updates.

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 1 July 2024 1:54 pm