2 results (0.032 seconds)

CVSS: 8.4EPSS: 0%CPEs: 2EXPL: 0

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices. The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center. This issue affects Paragon Active Assurance: 4.1.0, 4.2.0. Una vulnerabilidad de exposición de información confidencial a un actor no autorizado en Juniper Networks Paragon Active Assurance Control Center permite a un atacante adyacente a la red con acceso raíz a un dispositivo Test Agent la capacidad de acceder a información confidencial sobre dispositivos descendentes. El daemon "netrounds-probe-login" (también llamado probe_serviced) expone funciones en las que el dispositivo Test Agent (TA) presiona el estado/configuración de la interfaz, se da de baja, etc. El servicio remoto expone accidentalmente un objeto de base de datos interna que se puede usar para acceso directo. acceso a la base de datos en Paragon Active Assurance Control Center. • https://supportportal.juniper.net/JSA79173 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA's are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA's to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. • https://supportportal.juniper.net/JSA70595 • CWE-923: Improper Restriction of Communication Channel to Intended Endpoints •