Juniper Networks has launched out-of-band security updates to address a critical security flaw that could direct to an authentication bypass in some of its routers.
The vulnerability, tracked as CVE-2024-2973, carries a CVSS rating of 10., indicating utmost severity.
“An Authentication Bypass Employing an Alternate Path or Channel vulnerability in Juniper Networks Session Clever Router or Conductor working with a redundant peer makes it possible for a network dependent attacker to bypass authentication and get comprehensive regulate of the machine,” the enterprise claimed in an advisory issued last week.
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
According to Juniper Networks, the shortcoming impacts only individuals routers or conductors that are managing in large-availability redundant configurations. The list of impacted gadgets is mentioned below –
- Session Good Router (all versions before 5.6.15, from 6. prior to 6.1.9-lts, and from 6.2 right before 6.2.5-sts)
- Session Wise Conductor (all versions just before 5.6.15, from 6. prior to 6.1.9-lts, and from 6.2 before 6.2.5-sts)
- WAN Assurance Router (6. versions just before 6.1.9-lts and 6.2 variations just before 6.2.5-sts)
The networking machines maker, which was purchased out by Hewlett Packard Organization (HPE) for somewhere around $14 billion previously this calendar year, claimed it located no evidence of active exploitation of the flaw in the wild.
It also stated that it discovered the vulnerability all through inside item testing and that there are no workarounds that solve the issue.
“This vulnerability has been patched immediately on afflicted gadgets for MIST managed WAN Assurance routers connected to the Mist Cloud,” it more famous. “It is crucial to take note that the deal with is applied instantly on managed routers by a Conductor or on WAN assurance routers has no effect on details-aircraft features of the router.”
In January 2024, the organization also rolled out fixes for a critical vulnerability in the identical products and solutions (CVE-2024-21591, CVSS score: 9.8) that could permit an attacker to bring about a denial-of-services (DoS) or remote code execution and get hold of root privileges on the units.
With various security flaws influencing the firm’s SRX firewalls and EX switches weaponized by menace actors past yr, it can be vital that users implement the patches to secure against likely threats.
Located this short article appealing? Abide by us on Twitter and LinkedIn to study much more distinctive information we submit.
Some components of this write-up are sourced from:
thehackernews.com