Lucene search

K
cvelistJuniperCVELIST:CVE-2024-21589
HistoryJan 12, 2024 - 12:51 a.m.

CVE-2024-21589 Paragon Active Assurance Control Center: Information disclosure vulnerability

2024-01-1200:51:46
CWE-284
juniper
www.cve.org
cve-2024-21589
juniper networks
information disclosure vulnerability
configuration information
user data exfiltration
saas offering
version 3.1.0
version 3.2.0
version 3.2.2
version 3.3.0
version 3.3.1
version 3.4.0

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.2%

An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.

A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.

Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.

This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.

This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Paragon Active Assurance",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "3.1.0",
            "status": "affected"
          }
        ],
        "lessThan": "3.1.0",
        "status": "unaffected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.2.*",
        "status": "affected",
        "version": "3.2.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.2.*",
        "status": "affected",
        "version": "3.2.2",
        "versionType": "semver"
      },
      {
        "lessThan": "3.3.*",
        "status": "affected",
        "version": "3.3.0",
        "versionType": "semver"
      },
      {
        "lessThan": "3.3.*",
        "status": "affected",
        "version": "3.3.1",
        "versionType": "semver"
      },
      {
        "lessThan": "3.4.*",
        "status": "affected",
        "version": "3.4.0",
        "versionType": "semver"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.2%

Related for CVELIST:CVE-2024-21589