Juniper Networks Warns of Critical Authentication Bypass Vulnerability

Share This Post

Juniper Networks last week issued an out-of-cycle security bulletin to warn of a critical vulnerability leading to authentication bypass on Session Smart router and conductor products.

Tracked as CVE-2024-2973 (CVSS score of 10), the issue impacts all Session Smart routers and conductors running in high-availability redundant configurations, the company explains.

“An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or Conductor running with a redundant peer allows a network-based attacker to bypass authentication and take full control of the device,” Juniper Networks notes in its advisory.

According to the company, Session Smart router and connector versions before 5.6.15, 6.1.9-lts, and 6.2.5-sts are affected by CVE-2024-2973. WAN Assurance router versions before 6.1.9-lts, and 6.2.5-sts are vulnerable as well.

SSR-5.6.15, SSR-6.1.9-lts, SSR-6.2.5-sts, and subsequent releases address this vulnerability.

“It is suggested to upgrade all affected systems to these versions of software. In a Conductor-managed deployment, it is sufficient to upgrade the Conductor nodes only and the fix will be applied automatically to all connected routers. As practical, the routers should still be upgraded to a fixed version; however, they will not be vulnerable once they connect to an upgraded Conductor,” Juniper notes.

The company also explains that the vulnerability has been automatically resolved on affected devices for Mist managed WAN Assurance routers that are connected to the Mist cloud.

“It is important to note that the fix is applied automatically on managed routers by a Conductor or on WAN assurance routers has no impact on data-plane functions of the router. The application of the fix is non-disruptive to production traffic,” Juniper says.

Advertisement. Scroll to continue reading.

The update, however, might cause a downtime of less than 30 seconds to the web-based management and APIs.

Juniper Networks notes that there are no workarounds available for the vulnerability and that it is not aware of the flaw being exploited in attacks.

Related: Juniper Networks Publishes Dozens of New Security Advisories

Related: Juniper Networks Patches Vulnerabilities in Switches, Firewalls

Related: $2.5 Million Offered at Upcoming ‘Matrix Cup’ Chinese Hacking Contest

Related: Juniper Networks Patches Critical Remote Code Execution Flaw in Firewalls, Switches

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.