[Child CVE] JCNR and cRPD: Hard-coded SSH host keys in cRPD may allow Person-in-the-Middle (PitM) attacks
CVE-2024-30407

8.1HIGH

Key Information:

Vendor
Juniper Networks, Inc.
Status
Crpd
Juniper Cloud Native Router (jcnr)
Vendor
CVE Published:
12 April 2024

Badges

๐Ÿ‘พ Exploit Exists

Summary

The vulnerability presents a critical risk within Juniper Networks' Cloud Native Router (JCNR) and containerized Routing Protocol Daemon (cRPD) products due to the use of hard-coded SSH host keys. Attackers can exploit this flaw to initiate Person-in-the-Middle (PitM) attacks, enabling them to intercept and manipulate SSH traffic undetected. This interception could lead to a total compromise of the affected containerized environments, posing severe threats to the integrity and confidentiality of sensitive data. Organizations utilizing these products are urged to review their current versions to mitigate potential risks associated with this vulnerability.

Affected Version(s)

cRPD 0 < 23.4R1

Juniper Cloud Native Router (JCNR) 0 < 23.4

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.