// For flags

CVE-2024-30381

Paragon Active Assurance: probe_serviced exposes internal objects to local users

Severity Score

8.4
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices.

The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center.




This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.

Una vulnerabilidad de exposición de información confidencial a un actor no autorizado en Juniper Networks Paragon Active Assurance Control Center permite a un atacante adyacente a la red con acceso raíz a un dispositivo Test Agent la capacidad de acceder a información confidencial sobre dispositivos descendentes. El daemon "netrounds-probe-login" (también llamado probe_serviced) expone funciones en las que el dispositivo Test Agent (TA) presiona el estado/configuración de la interfaz, se da de baja, etc. El servicio remoto expone accidentalmente un objeto de base de datos interna que se puede usar para acceso directo. acceso a la base de datos en Paragon Active Assurance Control Center. Este problema afecta a Paragon Active Assurance: 4.1.0, 4.2.0.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Attack Requirements
None
Privileges Required
High
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
High
Integrity
None
High
Availability
None
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-03-26 CVE Reserved
  • 2024-04-12 CVE Published
  • 2024-04-13 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper Networks
Search vendor "Juniper Networks"
Paragon Active Assurance
Search vendor "Juniper Networks" for product "Paragon Active Assurance"
4.1.0
Search vendor "Juniper Networks" for product "Paragon Active Assurance" and version "4.1.0"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Paragon Active Assurance
Search vendor "Juniper Networks" for product "Paragon Active Assurance"
4.2.0
Search vendor "Juniper Networks" for product "Paragon Active Assurance" and version "4.2.0"
en
Affected