Skip to content

Juniper Releases Urgent Advisory - 20240701001

Overview

Juniper Networks has released an emergency update to address a maximum severity vulnerability that leads to authentication bypass in Session Smart Router (SSR), Session Smart Conductor, and WAN Assurance Router products. Exploitation of this vulnerability could allow an attacker to take full control of the device.

What is vulnerable?

Products Affected Versions CVE CVSS Severity
Session Smart Router - All versions before 5.6.15
- from 6.0 before 6.1.9-lts
- from 6.2 before 6.2.5-sts
CVE-2024-2973 10.0 Critical
Session Smart Conductor - All versions before 5.6.15
- from 6.0 before 6.1.9-lts
- from 6.2 before 6.2.5-sts
CVE-2024-2973 10.0 Critical
WAN Assurance Router - 6.0 versions before 6.1.9-lts
- 6.2 versions before 6.2.5-sts
CVE-2024-2973 10.0 Critical

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

  • Session Smart Router: SSR-5.6.15, SSR-6.1.9-lts, SSR-6.2.5-sts, and subsequent releases.

  • WAN Assurance Routers are patched automatically when connected to the Mist Cloud, but administrators of High-Availability clusters need to upgrade to SSR-6.1.9 or SSR-6.2.5.

  • Juniper also notes that upgrading Conductor nodes is enough to apply the fix automatically to connected routers, but routers should still be upgraded to the latest available version.

Additional References