#VU88491 Information disclosure in Paragon Active Assurance Control Center


Published: 2024-04-12

Vulnerability identifier: #VU88491

Vulnerability risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-30381

CWE-ID: CWE-200

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Paragon Active Assurance Control Center
Other software / Other software solutions

Vendor: Juniper Networks, Inc.

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to the "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center. A remote user on the local network with root access to a Test Agent Appliance can access sensitive information about downstream devices.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Paragon Active Assurance Control Center: 4.1.0 - 4.2.0


External links
http://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Paragon-Active-Assurance-probe-serviced-exposes-internal-objects-to-local-users-CVE-2024-30381


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability