Security

Patches

Juniper Networks flings out emergency patches for perfect 10 router vuln

Get 'em while they're hot


A critical vulnerability affecting Juniper Networks routers forced the vendor to issue emergency patches last week, and users are advised to apply them as soon as possible.

The authentication bypass bug, tracked as CVE-2024-2973, scored a perfect 10 rating on both the CVSS 3.1 and CVSS 4 systems, illustrating the seriousness of the issue.

"An authentication bypass using an alternate path or channel vulnerability in Juniper Networks Session Smart Router or Conductor running with a redundant peer allows a network-based attacker to bypass authentication and take full control of the device," Juniper said in its advisory.

The bug impacts Juniper's Smart Session Router, Session Smart Conductor management platform, and WAN Assurance Routers and only those that run high-availability redundant configurations are vulnerable.

While there is no evidence to suggest that the vulnerability has been exploited in the wild yet, the fact Juniper released the patches outside of the products' usual cycle hints at the vendor's concern about its severity and exploitability.

With CVE-2024-2973 affecting devices running high-availability configs too, successful attacks have the potential to cause significant disruption.

As for the specific vulnerable versions, for Session Smart Routers it's:

For Session Smart Conductor

And for WAN Assurance Routers

For routers managed by the Session Smart Conductor platform, Juniper said as long as the Conductor nodes are upgraded then the security fixes will automatically apply to connected routers.

The vendor still recommends upgrading each vulnerable router individually, but it would be quicker to protect against CVE-2024-2973 by just upgrading the Conductor nodes before doing the full job.

WAN Assurance Routers would also have had the patch applied automatically already if they were managed by and connected to Juniper Mist, its AI-driven cloud platform.

"It is important to note that the fix is applied automatically on managed routers by a Conductor or on WAN Assurance Routers has no impact on data-plane functions of the router. The application of the fix is non-disruptive to production traffic," Juniper said. 

"There may be a momentary downtime (less than 30 seconds) to the web-based management and APIs however this will resolve quickly." ®

Send us news
6 Comments

Admins better Spring into action over latest critical open source vuln

Patch up: The Spring framework dominates the Java ecosystem

macOS HM Surf vuln might already be under exploit by major malware family

Like keeping your camera and microphone private? Patch up

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites

Also, new EU cyber reporting rules are live, exploiters hit the gas pedal, free PDNS for UK schools, and more

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Thousands of Fortinet instances vulnerable to actively exploited flaw

No excuses for not patching this nine-month-old issue

Here's a NIS2 compliance checklist since no one cares about deadlines anymore

Only two EU members have completed the transposition into domestic law

CISA adds fresh Ivanti vuln, critical Fortinet bug to hall of shame

Usual three-week window to address significant risks to federal agencies applies

Mozilla patches critical Firefox vuln that attackers are already exploiting

Firefixed: It's maintenance time for low-complexity, high-impact security flaw

Microsoft says tougher punishments needed for state-sponsored cybercriminals

Although it also reaffirmed commitment to secure-by-design initiatives

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG

Penn State pays DoJ $1.25M to settle cybersecurity compliance case

Fight On, State? Not this time