Lucene search

K
cve[email protected]CVE-2024-21589
HistoryJan 12, 2024 - 1:15 a.m.

CVE-2024-21589

2024-01-1201:15:46
CWE-284
web.nvd.nist.gov
16
juniper
paragon active assurance
access control
vulnerability
cve-2024-21589

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.4%

An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.

A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.

Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.

This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.

This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.

Affected configurations

NVD
Node
juniperparagon_active_assurance_control_centerMatch3.1.0
OR
juniperparagon_active_assurance_control_centerMatch3.2.0
OR
juniperparagon_active_assurance_control_centerMatch3.2.2
OR
juniperparagon_active_assurance_control_centerMatch3.3.0
OR
juniperparagon_active_assurance_control_centerMatch3.3.1
OR
juniperparagon_active_assurance_control_centerMatch3.4.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Paragon Active Assurance",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "3.1.0",
            "status": "affected"
          }
        ],
        "lessThan": "3.1.0",
        "status": "unaffected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.2.*",
        "status": "affected",
        "version": "3.2.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.2.*",
        "status": "affected",
        "version": "3.2.2",
        "versionType": "semver"
      },
      {
        "lessThan": "3.3.*",
        "status": "affected",
        "version": "3.3.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.3.*",
        "status": "affected",
        "version": "3.3.1",
        "versionType": "semver"
      },
      {
        "lessThan": "3.4.*",
        "status": "affected",
        "version": "3.4.0",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.4%

Related for CVE-2024-21589