CVE-2021-31352

An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.
References
Link Resource
https://kb.juniper.net/JSA11217 Exploit Patch Vendor Advisory
https://kb.juniper.net/JSA11217 Exploit Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:juniper:session_and_resource_control:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:05

Type Values Removed Values Added
References () https://kb.juniper.net/JSA11217 - Exploit, Patch, Vendor Advisory () https://kb.juniper.net/JSA11217 - Exploit, Patch, Vendor Advisory

Information

Published : 2021-10-19 19:15

Updated : 2024-11-21 06:05


NVD link : CVE-2021-31352

Mitre link : CVE-2021-31352

CVE.ORG link : CVE-2021-31352


JSON object : View

Products Affected

juniper

  • session_and_resource_control
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-327

Use of a Broken or Risky Cryptographic Algorithm