All the vulnerabilites related to Juniper Networks - Paragon Active Assurance
cve-2024-21589
Vulnerability from cvelistv5
Published
2024-01-12 00:51
Modified
2024-08-01 22:27
Severity ?
EPSS score ?
Summary
Paragon Active Assurance Control Center: Information disclosure vulnerability
References
▼ | URL | Tags |
---|---|---|
https://supportportal.juniper.net/JSA75727 | vendor-advisory | |
https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N | technical-description |
Impacted products
▼ | Vendor | Product |
---|---|---|
Juniper Networks | Paragon Active Assurance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:34.809Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://supportportal.juniper.net/JSA75727" }, { "tags": [ "technical-description", "x_transferred" ], "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Paragon Active Assurance", "vendor": "Juniper Networks", "versions": [ { "changes": [ { "at": "3.1.0", "status": "affected" } ], "lessThan": "3.1.0", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThan": "3.2.*", "status": "affected", "version": "3.2.0", "versionType": "semver" }, { "lessThan": "3.2.*", "status": "affected", "version": "3.2.2", "versionType": "semver" }, { "lessThan": "3.3.*", "status": "affected", "version": "3.3.0", "versionType": "semver" }, { "lessThan": "3.3.*", "status": "affected", "version": "3.3.1", "versionType": "semver" }, { "lessThan": "3.4.*", "status": "affected", "version": "3.4.0", "versionType": "semver" } ] } ], "datePublic": "2024-01-10T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\u003c/p\u003e\u003cp\u003eA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\u003c/p\u003e\u003cp\u003eNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\u003c/p\u003e\u003cp\u003eThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\u003c/p\u003e\u003cp\u003eThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\u003cbr\u003e\u003c/p\u003e\n\n" } ], "value": "\nAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\n\nA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\n\nNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\n\nThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\n\nThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\n\n\n\n\n" } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(28, 30, 31);\"\u003eJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T00:51:46.607Z", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://supportportal.juniper.net/JSA75727" }, { "tags": [ "technical-description" ], "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.\u003cbr\u003e\u003c/p\u003e" } ], "value": "This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.\n\n\n" } ], "source": { "advisory": "JSA75727", "defect": [ "PAALS-407" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-01-10T17:00:00.000Z", "value": "Initial Publication" } ], "title": "Paragon Active Assurance Control Center: Information disclosure vulnerability", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThere are no known workarounds for this issue.\u003c/p\u003e" } ], "value": "There are no known workarounds for this issue.\n\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-av217" } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2024-21589", "datePublished": "2024-01-12T00:51:46.607Z", "dateReserved": "2023-12-27T19:38:25.703Z", "dateUpdated": "2024-08-01T22:27:34.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22190
Vulnerability from cvelistv5
Published
2022-04-14 15:50
Modified
2024-09-16 22:30
Severity ?
EPSS score ?
Summary
Paragon Active Assurance Control Center: Information disclosure vulnerability in crafted URL
References
▼ | URL | Tags |
---|---|---|
https://kb.juniper.net/JSA69500 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Juniper Networks | Paragon Active Assurance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA69500" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Paragon Active Assurance", "vendor": "Juniper Networks", "versions": [ { "status": "affected", "version": "3.1.0" }, { "lessThan": "3.1.0", "status": "unaffected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-04-13T00:00:00", "descriptions": [ { "lang": "en", "value": "An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-14T15:50:50", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA69500" } ], "solutions": [ { "lang": "en", "value": "This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.1, 3.2.0, 3.2.1, 3.2.2, and all subsequent releases." } ], "source": { "advisory": "JSA69500", "defect": [ "NF-7783" ], "discovery": "INTERNAL" }, "title": "Paragon Active Assurance Control Center: Information disclosure vulnerability in crafted URL", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2022-04-13T16:00:00.000Z", "ID": "CVE-2022-22190", "STATE": "PUBLIC", "TITLE": "Paragon Active Assurance Control Center: Information disclosure vulnerability in crafted URL" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Paragon Active Assurance", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "!\u003c", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA69500", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA69500" } ] }, "solution": [ { "lang": "en", "value": "This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.1, 3.2.0, 3.2.1, 3.2.2, and all subsequent releases." } ], "source": { "advisory": "JSA69500", "defect": [ "NF-7783" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2022-22190", "datePublished": "2022-04-14T15:50:50.767647Z", "dateReserved": "2021-12-21T00:00:00", "dateUpdated": "2024-09-16T22:30:37.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30381
Vulnerability from cvelistv5
Published
2024-04-12 14:56
Modified
2024-08-02 01:32
Severity ?
8.4 (High) - CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
8.4 (High) - CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
EPSS score ?
Summary
Paragon Active Assurance: probe_serviced exposes internal objects to local users
References
▼ | URL | Tags |
---|---|---|
https://supportportal.juniper.net/JSA79173 | vendor-advisory | |
https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H | technical-description |
Impacted products
▼ | Vendor | Product |
---|---|---|
Juniper Networks | Paragon Active Assurance |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30381", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T17:51:43.035688Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:22:48.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://supportportal.juniper.net/JSA79173" }, { "tags": [ "technical-description", "x_transferred" ], "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Paragon Active Assurance", "vendor": "Juniper Networks", "versions": [ { "status": "affected", "version": "4.1.0" }, { "status": "affected", "version": "4.2.0" } ] } ], "datePublic": "2024-04-10T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAn Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices.\u003cbr\u003e\u003cbr\u003eThe \"netrounds-probe-login\" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center.\u003c/p\u003e\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Paragon Active Assurance: 4.1.0, 4.2.0.\u003cbr\u003e\u003c/p\u003e" } ], "value": "An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices.\n\nThe \"netrounds-probe-login\" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center.\n\n\n\n\nThis issue affects Paragon Active Assurance: 4.1.0, 4.2.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "baseScore": 8.4, "baseSeverity": "HIGH", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-16T18:01:14.027Z", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://supportportal.juniper.net/JSA79173" }, { "tags": [ "technical-description" ], "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The following software releases have been updated to resolve this specific issue: Paragon Active Assurance 4.2.1, 4.3.0, and all subsequent versions.\u003cbr\u003e" } ], "value": "The following software releases have been updated to resolve this specific issue: Paragon Active Assurance 4.2.1, 4.3.0, and all subsequent versions." } ], "source": { "advisory": "JSA79173", "defect": [ "PAALS-1573" ], "discovery": "USER" }, "title": "Paragon Active Assurance: probe_serviced exposes internal objects to local users", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUse access lists or firewall filters to limit access to the Control Center only from trusted Test Agents and administrators.\u003c/p\u003e" } ], "value": "Use access lists or firewall filters to limit access to the Control Center only from trusted Test Agents and administrators." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2024-30381", "datePublished": "2024-04-12T14:56:38.299Z", "dateReserved": "2024-03-26T23:06:12.474Z", "dateUpdated": "2024-08-02T01:32:07.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-0232
Vulnerability from cvelistv5
Published
2021-04-22 19:37
Modified
2024-09-16 23:52
Severity ?
EPSS score ?
Summary
Paragon Active Assurance: Authentication bypass vulnerability in Control Center
References
▼ | URL | Tags |
---|---|---|
https://kb.juniper.net/JSA11127 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
▼ | Vendor | Product |
---|---|---|
Juniper Networks | Paragon Active Assurance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:32:10.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA11127" }, { "name": "FEDORA-2021-761cda0b77", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Paragon Active Assurance Control Center" ], "product": "Paragon Active Assurance", "vendor": "Juniper Networks", "versions": [ { "lessThan": "2.35.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.36.2", "status": "affected", "version": "2.36", "versionType": "custom" } ] } ], "datePublic": "2021-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-31T02:06:20", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA11127" }, { "name": "FEDORA-2021-761cda0b77", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 2.35.6, 2.36.2, 3.0.0 and all subsequent releases." } ], "source": { "advisory": "JSA11127", "defect": [ "NF-5939" ], "discovery": "INTERNAL" }, "title": "Paragon Active Assurance: Authentication bypass vulnerability in Control Center", "workarounds": [ { "lang": "en", "value": "All \u201cregister-only\u201d users in the system can be removed until software upgrade." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2021-04-14T16:00:00.000Z", "ID": "CVE-2021-0232", "STATE": "PUBLIC", "TITLE": "Paragon Active Assurance: Authentication bypass vulnerability in Control Center" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Paragon Active Assurance", "version": { "version_data": [ { "platform": "Paragon Active Assurance Control Center", "version_affected": "\u003c", "version_value": "2.35.6" }, { "platform": "Paragon Active Assurance Control Center", "version_affected": "\u003c", "version_name": "2.36", "version_value": "2.36.2" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA11127", "refsource": "MISC", "url": "https://kb.juniper.net/JSA11127" }, { "name": "FEDORA-2021-761cda0b77", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 2.35.6, 2.36.2, 3.0.0 and all subsequent releases." } ], "source": { "advisory": "JSA11127", "defect": [ "NF-5939" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "All \u201cregister-only\u201d users in the system can be removed until software upgrade." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2021-0232", "datePublished": "2021-04-22T19:37:00.678631Z", "dateReserved": "2020-10-27T00:00:00", "dateUpdated": "2024-09-16T23:52:13.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28971
Vulnerability from cvelistv5
Published
2023-04-17 00:00
Modified
2024-08-02 13:51
Severity ?
EPSS score ?
Summary
Paragon Active Assurance: Enabling the timescaledb enables IP forwarding
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Juniper Networks | Paragon Active Assurance |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:51:38.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://supportportal.juniper.net/JSA70595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Paragon Active Assurance", "vendor": "Juniper Networks", "versions": [ { "lessThan": "4.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2023-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA\u0027s are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA\u0027s to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. The timescaledb feature is installed as an optional package on the Control Center. When the timescaledb container is started, this causes side-effects by bypassing the existing firewall rules and limitations for Test Agent communications. Note: This issue only affects customers hosting their own on-prem Control Center. The Paragon Active Assurance Software as a Service (SaaS) is not affected by this vulnerability since the timescaledb service is not enabled. This issue affects all on-prem versions of Juniper Networks Paragon Active Assurance prior to 4.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-923", "description": "CWE-923 Improper Restriction of Communication Channel to Intended Endpoints", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-17T00:00:00", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "url": "https://supportportal.juniper.net/JSA70595" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 4.1.2, 4.2.0, and all subsequent releases." } ], "source": { "advisory": "JSA70595", "defect": [ "PAALS-1134" ], "discovery": "USER" }, "title": "Paragon Active Assurance: Enabling the timescaledb enables IP forwarding", "workarounds": [ { "lang": "en", "value": "If the timescaledb feature is not used - disable the service and disable IP forwarding.\n root@ncc:~# systemctl stop netrounds-timescaledb\n root@ncc:~# systemctl disable netrounds-timescaledb\n root@ncc:~# echo 0 \u003e /proc/sys/net/ipv4/ip_forward\n\nIn case timescaledb feature is used - drop forwarded packets by changing default forward policy to drop packets:\n\nStop running services, to clear dynamic rules\n ncc services stop openvpn metrics timescaledb\n\nSet default DROP policy for forwarding\n iptables -P FORWARD DROP\n ip6tables -P FORWARD DROP\n\nInstall iptables-persistent and save rules\n apt-get install iptables-persistent\n iptables-save \u003e /etc/iptables/rules.v4\n ip6tables-save \u003e /etc/iptables/rules.v6\n\nRestart services\n ncc services start openvpn metrics timescaledb\n \n\n" } ], "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2023-28971", "datePublished": "2023-04-17T00:00:00", "dateReserved": "2023-03-29T00:00:00", "dateUpdated": "2024-08-02T13:51:38.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }