Lucene search

K
cvelistJuniperCVELIST:CVE-2024-30407
HistoryApr 12, 2024 - 3:03 p.m.

CVE-2024-30407 [Child CVE] JCNR and cRPD: Hard-coded SSH host keys in cRPD may allow Person-in-the-Middle (PitM) attacks

2024-04-1215:03:40
CWE-321
juniper
www.cve.org
1
cve-2024-30407; hard-coded cryptographic key; person-in-the-middle attack; juniper networks; jcnr; crpd; ssh host keys

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

27.3%

The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud Native Router (JCNR) and containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container.

Due to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.

This issue affects Juniper Networks JCNR:

  • All versions before 23.4.

This issue affects Juniper Networks cRPD:

  • All versions before 23.4R1.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "cRPD",
    "vendor": "Juniper Networks, Inc.",
    "versions": [
      {
        "lessThan": "23.4R1",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Juniper Cloud Native Router (JCNR)",
    "vendor": "Juniper Networks, Inc.",
    "versions": [
      {
        "lessThan": "23.4",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

27.3%

Related for CVELIST:CVE-2024-30407