CVE-2024-30406

A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials. This issue affects only Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO.  This issue does not affect releases before 23.1R1-EVO.
Configurations

No configuration.

History

21 Nov 2024, 09:11

Type Values Removed Values Added
References () https://supportportal.juniper.net/JSA79104 - () https://supportportal.juniper.net/JSA79104 -
References () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N - () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N -
References () https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html - () https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html -
References () https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html - () https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html -

16 May 2024, 21:16

Type Values Removed Values Added
References
  • {'url': 'https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/RE:M/U:Green', 'source': 'sirt@juniper.net'}
  • () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N -
Summary (en) A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials. This issue affects only Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO.  This issue does not affect releases before 23.1R1-EVO. (en) A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials. This issue affects only Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO.  This issue does not affect releases before 23.1R1-EVO.

15 Apr 2024, 13:15

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de almacenamiento de texto plano en un archivo en disco en dispositivos Juniper Networks Junos OS Evolved ACX Series que utilizan el software Paragon Active Assurance Test Agent instalado en dispositivos de red permite a un atacante local autenticado con altos privilegios leer las credenciales de inicio de sesión de todos los demás usuarios. Este problema afecta solo a los dispositivos Juniper Networks Junos OS Evolved ACX Series que utilizan el software Paragon Active Assurance Test Agent instalado en estos dispositivos desde 23.1R1-EVO hasta 23.2R2-EVO. Este problema no afecta a las versiones anteriores a 23.1R1-EVO.

12 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-12 15:15

Updated : 2024-11-21 09:11


NVD link : CVE-2024-30406

Mitre link : CVE-2024-30406

CVE.ORG link : CVE-2024-30406


JSON object : View

Products Affected

No product.

CWE
CWE-313

Cleartext Storage in a File or on Disk