CVE-2024-30406Cleartext Storage in a File or on Disk in Networks Junos OS Evolved

Severity
6.7MEDIUMNVD
EPSS
0.0%
top 94.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 12

Description

A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials. This issue affects only Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO. This iss

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved23.1R1-EVO23.2R2-EVO
NVDjuniper/junos_os_evolved23.1, 23.2+1

🔴Vulnerability Details

2
CVEList
Junos OS Evolved: ACX Series with Paragon Active Assurance Test Agent: A local high privileged attacker can recover other administrators credentials2024-04-12
GHSA
GHSA-vgc6-c45c-9998: A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Ag2024-04-12

📋Vendor Advisories

1
Juniper
CVE-2024-30406: A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Ag2024-04-12
CVE-2024-30406 — Cleartext Storage in a File or on Disk | cvebase