[Child CVE] JCNR and cRPD: Hard-coded SSH host keys in cRPD may allow Person-in-the-Middle (PitM) attacks
CVE-2024-30407
Key Information:
- Vendor
- Juniper Networks, Inc.
- Status
- Crpd
- Juniper Cloud Native Router (jcnr)
- Vendor
- CVE Published:
- 12 April 2024
Badges
Summary
The vulnerability presents a critical risk within Juniper Networks' Cloud Native Router (JCNR) and containerized Routing Protocol Daemon (cRPD) products due to the use of hard-coded SSH host keys. Attackers can exploit this flaw to initiate Person-in-the-Middle (PitM) attacks, enabling them to intercept and manipulate SSH traffic undetected. This interception could lead to a total compromise of the affected containerized environments, posing severe threats to the integrity and confidentiality of sensitive data. Organizations utilizing these products are urged to review their current versions to mitigate potential risks associated with this vulnerability.
Affected Version(s)
cRPD 0 < 23.4R1
Juniper Cloud Native Router (JCNR) 0 < 23.4
References
CVSS V3.1
Timeline
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved