CVE-2024-30381 | Date: (C)2024-04-12 (M)2024-04-16 |
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices.
The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center.
This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 8.4 | CVSS Score : |
Exploit Score: 1.7 | Exploit Score: |
Impact Score: 6.0 | Impact Score: |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: ADJACENT_NETWORK | Access Vector: |
Attack Complexity: LOW | Access Complexity: |
Privileges Required: HIGH | Authentication: |
User Interaction: NONE | Confidentiality: |
Scope: CHANGED | Integrity: |
Confidentiality: HIGH | Availability: |
Integrity: HIGH | |
Availability: HIGH | |
| |