Pietro Melillo : 1 July 2024 08:45
Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentication bypass in some of its routers. This vulnerability, identified as CVE-2024-2973, has received a CVSS score of 10.0, indicating the highest possible severity.
According to Juniper Networks, the vulnerability involves an authentication bypass using an alternate path or channel in Session Smart routers or conductors that operate with a redundant peer. This issue allows a network-based attacker to bypass authentication and take full control of the device. In an advisory issued last week, the company explained that the vulnerability affects only routers or conductors configured in high-availability redundant mode.
The security updates are intended for the following devices:
Iscriviti GRATIS alla RHC Conference 2025 (Venerdì 9 maggio 2025)
Il giorno Venerdì 9 maggio 2025 presso il teatro Italia di Roma (a due passi dalla stazione termini e dalla metro B di Piazza Bologna), si terrà
la RHC Conference 2025. Si tratta dell’appuntamento annuale gratuito, creato dalla community di RHC, per far accrescere l’interesse verso le tecnologie digitali, l’innovazione digitale e la consapevolezza del rischio informatico.
La giornata inizierà alle 9:30 (con accoglienza dalle 9:00) e sarà interamente dedicata alla RHC Conference, un evento di spicco nel campo della sicurezza informatica. Il programma prevede un panel con ospiti istituzionali che si terrà all’inizio della conferenza. Successivamente, numerosi interventi di esperti nazionali nel campo della sicurezza informatica si susseguiranno sul palco fino alle ore 19:00 circa, quando termineranno le sessioni. Prima del termine della conferenza, ci sarà la premiazione dei vincitori della Capture The Flag prevista per le ore 18:00.
Potete iscrivervi gratuitamente all'evento utilizzando questo link.
Per ulteriori informazioni, scrivi a [email protected] oppure su Whatsapp al 379 163 8765
Supporta RHC attraverso:
Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo.
Juniper Networks, acquired by Hewlett Packard Enterprise (HPE) for approximately $14 billion earlier this year, stated that they have found no evidence of active exploitation of the vulnerability in the wild. The vulnerability was discovered during internal product testing, and there are no workarounds that can resolve the issue definitively.
In a further statement, Juniper Networks reassured users that the vulnerability has been automatically patched on affected devices for MIST-managed WAN Assurance routers connected to the Mist Cloud. The company emphasized that the fix, applied automatically on routers managed by a Conductor or on WAN Assurance routers, has no impact on the router’s data-plane functions, ensuring that network operations remain unaffected and secure.
Juniper Networks’ commitment to the security of its products and its swift response to the discovery of this vulnerability highlight the importance of keeping network devices updated. Users are encouraged to check the versions of their devices and ensure that security updates are applied promptly to protect their networks from potential threats.
For further details and to access security updates, please visit the official Juniper Networks website.