1 July 2024

Juniper Networks releases out-of-band security updates to fix critical router flaw


Juniper Networks releases out-of-band security updates to fix critical router flaw

US-based networking products maker Juniper Networks has issued out-of-band security updates to address a critical vulnerability in some of its routers, which could lead to an authentication bypass.

The flaw, identified as CVE-2024-2973, exists due to missing authentication checks when running with a redundant peer. A remote non-authenticated attacker can bypass authentication and take full control over the affected device.

According to Juniper, the vulnerability affects only routers or conductors running in high-availability redundant configurations. The issue affects the following products:

Session Smart Router:

  • All versions before 5.6.15,

  • from 6.0 before 6.1.9-lts,

  • from 6.2 before 6.2.5-sts.

Session Smart Conductor:

  • All versions before 5.6.15,

  • from 6.0 before 6.1.9-lts,

  • from 6.2 before 6.2.5-sts.

WAN Assurance Router:

  • 6.0 versions before 6.1.9-lts,

  • 6.2 versions before 6.2.5-sts.

Juniper Networks has released the security updates in the following versions to mitigate the vulnerability: Session Smart Router versions 5.6.15, 6.1.9-lts, and 6.2.5-sts.

“This vulnerability has been patched automatically on affected devices for MIST managed WAN Assurance routers connected to the Mist Cloud,” Juniper said in a security advisory. “It is important to note that the fix is applied automatically on managed routers by a Conductor or on WAN assurance routers has no impact on data-plane functions of the router. The application of the fix is non-disruptive to production traffic. There may be a momentary downtime (less than 30 seconds) to the web-based management and APIs however this will resolve quickly.”

Although the vendor said it has no evidence this flaw is being exploited in the wild, users are advised to update their systems as soon as possible.


Back to the list

Latest Posts

Infostealer logs can help identify visitors of child abuse websites

Infostealer logs can help identify visitors of child abuse websites

The research found that Brazil, India, and the United States had the highest counts of users with credentials to known CSAM communities.
3 July 2024
Australian man charged for running fake Wi-Fi access points to steal user data

Australian man charged for running fake Wi-Fi access points to steal user data

The man created ‘evil twin’ free Wi-Fi networks in various locations.
3 July 2024
Unfurling Hemlock threat actor deploys up to 10 malware files simultaneously

Unfurling Hemlock threat actor deploys up to 10 malware files simultaneously

The malware includes info-stealers such as Mystic Stealer, Rise Pro, and Redline.
2 July 2024