Skip to content

An Authentication Bypass Using an Alternate Path or...

Critical severity Unreviewed Published Jun 27, 2024 to the GitHub Advisory Database • Updated Jun 27, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or conductor running with a redundant peer allows a network based attacker to bypass authentication and take full control of the device.
Only routers or conductors that are running in high-availability redundant configurations are affected by this vulnerability.

No other Juniper Networks products or platforms are affected by this issue.

This issue affects:

Session Smart Router: 

  • All versions before 5.6.15, 
  • from 6.0 before 6.1.9-lts, 
  • from 6.2 before 6.2.5-sts.

Session Smart Conductor: 

  • All versions before 5.6.15, 
  • from 6.0 before 6.1.9-lts, 
  • from 6.2 before 6.2.5-sts. 

WAN Assurance Router: 

  • 6.0 versions before 6.1.9-lts, 
  • 6.2 versions before 6.2.5-sts.

References

Published by the National Vulnerability Database Jun 27, 2024
Published to the GitHub Advisory Database Jun 27, 2024
Last updated Jun 27, 2024

Severity

Critical
10.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2024-2973

GHSA ID

GHSA-jcwm-g9h6-hf43

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.