Vulnerability Description
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Paragon Active Assurance Control Center | 3.1.0 |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA69500Vendor Advisory
- https://kb.juniper.net/JSA69500Vendor Advisory
FAQ
What is CVE-2022-22190?
CVE-2022-22190 is a vulnerability with a CVSS score of 7.4 (HIGH). An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potential...
How severe is CVE-2022-22190?
CVE-2022-22190 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-22190?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Paragon Active Assurance Control Center.