Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-30381— Paragon Active Assurance: probe_serviced exposes internal objects to local users

CVSS 8.4 · High EPSS 0.12% · P30
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-30381

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Paragon Active Assurance: probe_serviced exposes internal objects to local users
Source: NVD (National Vulnerability Database)
Vulnerability Description
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices. The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center. This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Paragon Active Assurance 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Paragon Active Assurance是美国瞻博网络(Juniper Networks)公司的一种可编程的测试和服务保证解决方案。使用基于软件和流量生成的测试代理,可作为 SaaS 解决方案从云中轻松使用和交付,或在 NFV 环境中本地部署。 Juniper Networks Paragon Active Assurance 4.1.0版本和4.2.0版本存在安全漏洞,该漏洞源于存在敏感信息泄露漏洞,攻击者能够访问有关下游设备的敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksParagon Active Assurance 4.1.0 -

II. Public POCs for CVE-2024-30381

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-30381

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2024-04-12 · 29 CVEs total

CVE-2024-303987.5 HIGHJunos OS: SRX4600 Series - A high amount of specific traffic causes packet drops and an ev
CVE-2024-215987.5 HIGHJunos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to
CVE-2024-303977.5 HIGHJunos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (
CVE-2024-303827.5 HIGHJunos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configu
CVE-2024-303927.5 HIGHJunos OS: MX Series with SPC3 and MS-MPC/-MIC: When URL filtering is enabled and a specifi
CVE-2024-303947.5 HIGHJunos OS and Junos OS Evolved: A specific EVPN type-5 route causes rpd crash
CVE-2024-303957.5 HIGHJunos OS and Junos OS Evolved: A malformed BGP tunnel encapsulation attribute will lead to
CVE-2024-304057.5 HIGHJunos OS: SRX 5000 Series with SPC2: Processing of specific crafted packets when ALG is en
CVE-2024-304036.5 MEDIUMJunos OS Evolved: When MAC learning happens, and an interface gets flapped, the PFE crashe
CVE-2024-303876.5 MEDIUMJunos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash
CVE-2024-303886.5 MEDIUMJunos OS: QFX5000 Series and EX Series: Specific malformed LACP packets will cause flaps
CVE-2024-216186.5 MEDIUMJunos OS and Junos OS Evolved: When LLDP is enabled and a malformed LLDP packet is receive
CVE-2024-216096.5 MEDIUMJunos OS: MX Series with SPC3, and SRX Series: If specific IPsec parameters are negotiated
CVE-2024-215936.5 MEDIUMJunos OS: MX Series with MPC10, MPC11, LC9600, and MX304: A specific MPLS packet will caus
CVE-2024-216056.5 MEDIUMJunos OS: SRX 300 Series: Specific link local traffic causes a control plane overload
CVE-2024-304025.9 MEDIUMJunos OS and Junos OS Evolved: The l2ald crashes on receiving telemetry messages from a sp
CVE-2024-304015.9 MEDIUMJunos OS: MX Series and EX9200-15C: Stack-based buffer overflow in aftman
CVE-2024-304105.8 MEDIUMJunos OS: EX4300 Series: Loopback filter not blocking traffic despite having discard term.
CVE-2024-303895.8 MEDIUMJunos OS: EX4300 Series: Firewall filter not blocking egress traffic
CVE-2024-303845.5 MEDIUMJunos OS: EX4300 Series: If a specific CLI command is issued PFE crashes will occur

Showing top 20 of 29 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-30381

No comments yet


Leave a comment