An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Session Smart Router or conductor running with a redundant peer allows a network based attacker to bypass authentication and take full control of the device.
Only routers or conductors that are running in high-availability redundant configurations are affected by this vulnerability.
No other Juniper Networks products or platforms are affected by this issue.
This issue affects:
Session Smart Router:
* All versions before 5.6.15,
* from 6.0 before 6.1.9-lts,
* from 6.2 before 6.2.5-sts.
Session Smart Conductor:
* All versions before 5.6.15,
* from 6.0 before 6.1.9-lts,
* from 6.2 before 6.2.5-sts.
WAN Assurance Router:
* 6.0 versions before 6.1.9-lts,
* 6.2 versions before 6.2.5-sts.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2024-06-27T20:17:50.239Z
Updated: 2024-08-01T19:32:42.563Z
Reserved: 2024-03-26T23:06:22.816Z
Link: CVE-2024-2973
Vulnrichment
Updated: 2024-08-01T19:32:42.563Z
NVD
Status : Awaiting Analysis
Published: 2024-06-27T21:15:15.037
Modified: 2024-06-28T10:27:00.920
Link: CVE-2024-2973
Redhat
No data.