CVE-2024-2973
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/06/2024
Last modified:
28/06/2024
Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or conductor running with a redundant peer allows a network based attacker to bypass authentication and take full control of the device.<br />
Only routers or conductors that are running in high-availability redundant configurations are affected by this vulnerability.<br />
<br />
<br />
<br />
<br />
No other Juniper Networks products or platforms are affected by this issue.<br />
<br />
<br />
<br />
<br />
<br />
This issue affects:<br />
<br />
Session Smart Router: <br />
<br />
<br />
<br />
* All versions before 5.6.15, <br />
* from 6.0 before 6.1.9-lts, <br />
* from 6.2 before 6.2.5-sts.<br />
<br />
<br />
<br />
Session Smart Conductor: <br />
<br />
<br />
<br />
* All versions before 5.6.15, <br />
* from 6.0 before 6.1.9-lts, <br />
* from 6.2 before 6.2.5-sts. <br />
<br />
<br />
<br />
WAN Assurance Router: <br />
<br />
<br />
<br />
* 6.0 versions before 6.1.9-lts, <br />
* 6.2 versions before 6.2.5-sts.
Impact
Base Score 3.x
10.00
Severity 3.x
CRITICAL