We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-30407

[Child CVE] JCNR and cRPD: Hard-coded SSH host keys in cRPD may allow Person-in-the-Middle (PitM) attacks



Description

The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud Native Router (JCNR) and containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container. Due to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.  This issue affects Juniper Networks JCNR: * All versions before 23.4. This issue affects Juniper Networks cRPD: * All versions before 23.4R1.

Reserved 2024-03-26 | Published 2024-04-12 | Updated 2024-08-02 | Assigner juniper


HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-321 Use of Hard-coded Cryptographic Key

Product status

Default status
unaffected

Any version before 23.4R1
affected

Default status
unaffected

Any version before 23.4
affected

Timeline

2024-04-10:Initial Publication

References

supportportal.juniper.net/JSA79106 vendor-advisory

supportportal.juniper.net/JSA79107 vendor-advisory

www.first.org/cvss/calculator/4.0 technical-description

cve.org (CVE-2024-30407)

nvd.nist.gov (CVE-2024-30407)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-30407

Support options

Helpdesk Chat, Email, Knowledgebase