The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud Native Router (JCNR) and containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container.
Due to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.
This issue affects Juniper Networks JCNR:
* All versions before 23.4.
This issue affects Juniper Networks cRPD:
* All versions before 23.4R1.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: juniper
Published: 2024-04-12T15:03:40.856Z
Updated: 2024-08-02T01:32:07.279Z
Reserved: 2024-03-26T23:06:19.981Z
Link: CVE-2024-30407
Vulnrichment
Updated: 2024-08-02T01:32:07.279Z
NVD
Status : Awaiting Analysis
Published: 2024-04-12T15:15:25.540
Modified: 2024-05-16T21:16:10.210
Link: CVE-2024-30407
Redhat
No data.