Skip to main content

Juniper Networks Releases Out-of-Cycle Security Bulletin for Session Smart Router (SSR)

Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Authentication bypass vulnerability CVE-2024-2973 affects Session Smart Router, Conductor, and WAN Assurance Router


Threat details

High-availability redundant configurations

Only Routers or Conductors that are running in high-availability redundant configurations are affected by this vulnerability.

This vulnerability has been patched automatically on affected devices for MIST managed WAN Assurance routers connected to the Mist Cloud.


Introduction

Juniper Networks has released an out-of-cycle security update addressing one critical authentication bypass using an alternate path or channel vulnerability, which has a CVSSv4 score of 10.0. This vulnerability affects Juniper Networks Session Smart Router or Conductor running with a redundant peer configuration. An authenticated, remote attacker could exploit this vulnerability to bypass authentication and take full control of the device.


Remediation advice

Affected organisations are encouraged to review Juniper Networks out-of-cycle security bulletin: "Session Smart Router(SSR): On redundant router deployments API authentication can be bypassed (CVE-2024-2973)" Article ID JSA83126 and apply any relevant security updates.



Last edited: 1 July 2024 1:54 pm