Логотип exploitDog
bind:CVE-2024-30381
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-30381

Количество 3

Количество 3

nvd логотип

CVE-2024-30381

почти 2 года назад

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices. The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center. This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-r9qf-w2c7-fjr5

почти 2 года назад

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices. The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center. This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2024-03032

почти 2 года назад

Уязвимость демона probe_serviced платформы тестирования и мониторинга физических, гибридных и виртуальных сетей Paragon Active Assurance (ранее известная как Netrounds), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-30381

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices. The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center. This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.

CVSS3: 8.4
0%
Низкий
почти 2 года назад
github логотип
GHSA-r9qf-w2c7-fjr5

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Networks Paragon Active Assurance Control Center allows a network-adjacent attacker with root access to a Test Agent Appliance the ability to access sensitive information about downstream devices. The "netrounds-probe-login" daemon (also called probe_serviced) exposes functions where the Test Agent (TA) Appliance pushes interface state/config, unregister itself, etc. The remote service accidentally exposes an internal database object that can be used for direct database access on the Paragon Active Assurance Control Center. This issue affects Paragon Active Assurance: 4.1.0, 4.2.0.

CVSS3: 8.4
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-03032

Уязвимость демона probe_serviced платформы тестирования и мониторинга физических, гибридных и виртуальных сетей Paragon Active Assurance (ранее известная как Netrounds), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 8.4
0%
Низкий
почти 2 года назад

Уязвимостей на страницу