Juniper Networks releases out-of-band security updates to fix critical router flaw

Juniper Networks releases out-of-band security updates to fix critical router flaw

US-based networking products maker Juniper Networks has issued out-of-band security updates to address a critical vulnerability in some of its routers, which could lead to an authentication bypass.

The flaw, identified as CVE-2024-2973, exists due to missing authentication checks when running with a redundant peer. A remote non-authenticated attacker can bypass authentication and take full control over the affected device.

According to Juniper, the vulnerability affects only routers or conductors running in high-availability redundant configurations. The issue affects the following products:

Session Smart Router:

  • All versions before 5.6.15,

  • from 6.0 before 6.1.9-lts,

  • from 6.2 before 6.2.5-sts.

Session Smart Conductor:

  • All versions before 5.6.15,

  • from 6.0 before 6.1.9-lts,

  • from 6.2 before 6.2.5-sts.

WAN Assurance Router:

  • 6.0 versions before 6.1.9-lts,

  • 6.2 versions before 6.2.5-sts.

Juniper Networks has released the security updates in the following versions to mitigate the vulnerability: Session Smart Router versions 5.6.15, 6.1.9-lts, and 6.2.5-sts.

“This vulnerability has been patched automatically on affected devices for MIST managed WAN Assurance routers connected to the Mist Cloud,” Juniper said in a security advisory. “It is important to note that the fix is applied automatically on managed routers by a Conductor or on WAN assurance routers has no impact on data-plane functions of the router. The application of the fix is non-disruptive to production traffic. There may be a momentary downtime (less than 30 seconds) to the web-based management and APIs however this will resolve quickly.”

Although the vendor said it has no evidence this flaw is being exploited in the wild, users are advised to update their systems as soon as possible.


Back to the list

Latest Posts

Cyber Security Week in Review: July 4, 2025

Cyber Security Week in Review: July 4, 2025

In brief: Google patches Chrome 0Day, the US is on the hunt for North Korean IT workers, and more.
4 July 2025
AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025