Authentication Bypass Using Alternate Path or Channel Vulnerability Affects Juniper Networks Routers and Conductors
CVE-2024-2973

10CRITICAL

Key Information:

Badges

👾 Exploit Exists📰 News Worthy

Summary

A critical vulnerability affecting Juniper Networks routers, identified as CVE-2024-2973, has been discovered, allowing an authentication bypass when running with a redundant peer. This vulnerability affects Session Smart Router versions before 5.6.15, from 6.0 before 6.1.9-lts, and from 6.2 before 6.2.5-sts, as well as Session Smart Conductor versions before 5.6.15, from 6.0 before 6.1.9-lts, and 6.2 before 6.2.5-sts, and WAN Assurance Router versions 6.0 before 6.1.9-lts and 6.2 before 6.2.5-sts. Emergency patches have been released by Juniper Networks to fix this vulnerability, and there have been no reported instances of exploitation in the wild. Juniper Networks Security Incident Response Team has not detected any threat, and the company has swiftly responded by issuing updates and providing guidance for users to update their systems.

Affected Version(s)

Session Smart Conductor 0 < 5.6.15

Session Smart Conductor 6.0 < 6.1.9-lts

Session Smart Conductor 6.2 < 6.2.5-sts

News Articles

Juniper Networks Issues Patches For Router Vulnerability

Juniper Networks releases urgent updates to fix CVE-2024-2973, a critical router vulnerability allowing authentication bypass, urging immediate upgrades.

6 months ago

Emergency patches now available for Juniper Networks routers

A critical vulnerability affecting Juniper Networks routers forced the vendor to issue emergency patches last week, and users are advised to apply them as soon as possible. The authentication bypass bug,...

6 months ago

Juniper vulnerability allows remote takeover, patch available

Juniper Networks has issued an emergency patch to fix a critical vulnerability. CVE-2024-2973 allows hackers to take over devices.

6 months ago

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by CybersecurityNews

  • Vulnerability published

Collectors

NVD DatabaseMitre Database6 News Article(s)
.