Vulnerability Description
An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Paragon Active Assurance Control Center | < 2.35.6 |
| Fedoraproject | Fedora | 35 |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA11127Vendor Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://kb.juniper.net/JSA11127Vendor Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2021-0232?
CVE-2021-0232 is a vulnerability with a CVSS score of 7.4 (HIGH). An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already register...
How severe is CVE-2021-0232?
CVE-2021-0232 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-0232?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Paragon Active Assurance Control Center, Fedoraproject Fedora.