Lucene search

K
vulnrichmentJuniperVULNRICHMENT:CVE-2024-30407
HistoryApr 12, 2024 - 3:03 p.m.

CVE-2024-30407 [Child CVE] JCNR and cRPD: Hard-coded SSH host keys in cRPD may allow Person-in-the-Middle (PitM) attacks

2024-04-1215:03:40
CWE-321
juniper
github.com
cve-2024-30407
hard-coded cryptographic key
ssh host keys
pitm attacks
juniper networks
jcnr
crpd

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.4%

The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud Native Router (JCNR) and containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container.

Due to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.

This issue affects Juniper Networks JCNR:

  • All versions before 23.4.

This issue affects Juniper Networks cRPD:

  • All versions before 23.4R1.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "cRPD",
    "vendor": "Juniper Networks, Inc.",
    "versions": [
      {
        "lessThan": "23.4R1",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Juniper Cloud Native Router (JCNR)",
    "vendor": "Juniper Networks, Inc.",
    "versions": [
      {
        "lessThan": "23.4",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

9.2 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.4%

Related for VULNRICHMENT:CVE-2024-30407