Security

Patches

Juniper Networks flings out emergency patches for perfect 10 router vuln

Get 'em while they're hot


A critical vulnerability affecting Juniper Networks routers forced the vendor to issue emergency patches last week, and users are advised to apply them as soon as possible.

The authentication bypass bug, tracked as CVE-2024-2973, scored a perfect 10 rating on both the CVSS 3.1 and CVSS 4 systems, illustrating the seriousness of the issue.

"An authentication bypass using an alternate path or channel vulnerability in Juniper Networks Session Smart Router or Conductor running with a redundant peer allows a network-based attacker to bypass authentication and take full control of the device," Juniper said in its advisory.

The bug impacts Juniper's Smart Session Router, Session Smart Conductor management platform, and WAN Assurance Routers and only those that run high-availability redundant configurations are vulnerable.

While there is no evidence to suggest that the vulnerability has been exploited in the wild yet, the fact Juniper released the patches outside of the products' usual cycle hints at the vendor's concern about its severity and exploitability.

With CVE-2024-2973 affecting devices running high-availability configs too, successful attacks have the potential to cause significant disruption.

As for the specific vulnerable versions, for Session Smart Routers it's:

For Session Smart Conductor

And for WAN Assurance Routers

For routers managed by the Session Smart Conductor platform, Juniper said as long as the Conductor nodes are upgraded then the security fixes will automatically apply to connected routers.

The vendor still recommends upgrading each vulnerable router individually, but it would be quicker to protect against CVE-2024-2973 by just upgrading the Conductor nodes before doing the full job.

WAN Assurance Routers would also have had the patch applied automatically already if they were managed by and connected to Juniper Mist, its AI-driven cloud platform.

"It is important to note that the fix is applied automatically on managed routers by a Conductor or on WAN Assurance Routers has no impact on data-plane functions of the router. The application of the fix is non-disruptive to production traffic," Juniper said. 

"There may be a momentary downtime (less than 30 seconds) to the web-based management and APIs however this will resolve quickly." ®

Send us news
6 Comments

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

MediaTek rings in the new year with a parade of chipset vulns

Manufacturers should have had ample time to apply the fixes

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'

DNA sequencers found running ancient BIOS, posing risk to clinical research

Devices on six-year-old firmware vulnerable to takeover and destruction

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Six vulnerabilities in ubiquitous rsync tool announced and fixed in a day

Turns out tool does both file transfers and security fixes fast

Infoseccer: Private security biz let guard down, exposed 120K+ files

Assist Security’s client list includes fashion icons, critical infrastructure orgs

Snyk appears to deploy 'malicious' packages targeting Cursor for unknown reason

Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test