We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud Native Router (JCNR) and containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container. Due to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected. This issue affects Juniper Networks JCNR: * All versions before 23.4. This issue affects Juniper Networks cRPD: * All versions before 23.4R1.
Reserved 2024-03-26 | Published 2024-04-12 | Updated 2024-08-02 | Assigner juniperCWE-321 Use of Hard-coded Cryptographic Key
2024-04-10: | Initial Publication |
supportportal.juniper.net/JSA79106
supportportal.juniper.net/JSA79107
www.first.org/cvss/calculator/4.0
Support options