Juniper Networks Releases Out-of-Cycle Security Bulletin for Session Smart Router (SSR)
Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router
Summary
Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router
Affected platforms
The following platforms are known to be affected:
Threat details
High-availability redundant configurations
Only Routers or Conductors that are running in high-availability redundant configurations are affected by this vulnerability.
This vulnerability has been patched automatically on affected devices for MIST managed WAN Assurance routers connected to the Mist Cloud.
Introduction
Juniper Networks has released an out-of-cycle security update addressing one critical authentication bypass using an alternate path or channel vulnerability, which has a CVSSv4 score of 10.0. This vulnerability affects Juniper Networks Session Smart Router or Conductor running with a redundant peer configuration. An authenticated, remote attacker could exploit this vulnerability to bypass authentication and take full control of the device.
Remediation advice
Affected organisations are encouraged to review Juniper Networks out-of-cycle security bulletin: "Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed (CVE-2024-2973)" Article ID JSA83126 and apply any relevant security updates.
Definitive source of threat updates
Last edited: 1 July 2024 1:54 pm