CVE-2024-2973
Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or conductor running with a redundant peer allows a network based attacker to bypass authentication and take full control of the device.
Only routers or conductors that are running in high-availability redundant configurations are affected by this vulnerability.
No other Juniper Networks products or platforms are affected by this issue.
This issue affects:
Session Smart Router:
* All versions before 5.6.15,
* from 6.0 before 6.1.9-lts,
* from 6.2 before 6.2.5-sts.
Session Smart Conductor:
* All versions before 5.6.15,
* from 6.0 before 6.1.9-lts,
* from 6.2 before 6.2.5-sts.
WAN Assurance Router:
* 6.0 versions before 6.1.9-lts,
* 6.2 versions before 6.2.5-sts.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-03-26 CVE Reserved
- 2024-06-27 CVE Published
- 2024-06-28 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://support.juniper.net/support/eol/software/ssr | Related |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://supportportal.juniper.net/JSA83126 | 2024-06-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Juniper Networks Search vendor "Juniper Networks" | Session Smart Router Search vendor "Juniper Networks" for product "Session Smart Router" | < 5.6.15 Search vendor "Juniper Networks" for product "Session Smart Router" and version " < 5.6.15" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Session Smart Router Search vendor "Juniper Networks" for product "Session Smart Router" | >= 6.0.0 < 6.1.9-lts Search vendor "Juniper Networks" for product "Session Smart Router" and version " >= 6.0.0 < 6.1.9-lts" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Session Smart Router Search vendor "Juniper Networks" for product "Session Smart Router" | >= 6.2.0 < 6.2.5-sts Search vendor "Juniper Networks" for product "Session Smart Router" and version " >= 6.2.0 < 6.2.5-sts" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Session Smart Conductor Search vendor "Juniper Networks" for product "Session Smart Conductor" | < 5.6.15 Search vendor "Juniper Networks" for product "Session Smart Conductor" and version " < 5.6.15" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Session Smart Conductor Search vendor "Juniper Networks" for product "Session Smart Conductor" | >= 6.0.0 < 6.1.9-lts Search vendor "Juniper Networks" for product "Session Smart Conductor" and version " >= 6.0.0 < 6.1.9-lts" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Session Smart Conductor Search vendor "Juniper Networks" for product "Session Smart Conductor" | >= 6.2.0 < 6.2.5-sts Search vendor "Juniper Networks" for product "Session Smart Conductor" and version " >= 6.2.0 < 6.2.5-sts" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | WAN Assurance Router Search vendor "Juniper Networks" for product "WAN Assurance Router" | >= 6.0.0 < 6.1.9-lts Search vendor "Juniper Networks" for product "WAN Assurance Router" and version " >= 6.0.0 < 6.1.9-lts" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | WAN Assurance Router Search vendor "Juniper Networks" for product "WAN Assurance Router" | >= 6.2.0 < 6.2.5-sts Search vendor "Juniper Networks" for product "WAN Assurance Router" and version " >= 6.2.0 < 6.2.5-sts" | en |
Affected
|