Vulnerabilites related to juniper - paragon_active_assurance_control_center
cve-2022-22229
Vulnerability from cvelistv5
Published
2022-10-18 02:46
Modified
2024-09-16 16:28
Summary
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.
References
Impacted products
Vendor Product Version
Juniper Networks Paragon Active Assurance (Formerly Netrounds) Version: unspecified   < 3.1.1
Version: 3.2   < 3.2.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:49.771Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69883",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Paragon Active Assurance (Formerly Netrounds)",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "3.1.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "3.2.1",
                     status: "affected",
                     version: "3.2",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-10-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-10-18T00:00:00",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               url: "https://kb.juniper.net/JSA69883",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 3.1.1, 3.2.1, 3.3.0, and all subsequent releases.\n\nAdditionally, if there are malicious templates in the system, once upgraded to a fixed release, these templates can be safely removed from the system.",
            },
         ],
         source: {
            advisory: "JSA69883",
            defect: [
               "CCC-299",
            ],
            discovery: "INTERNAL",
         },
         title: "Paragon Active Assurance (Formerly Netrounds): Stored Cross-site Scripting (XSS) vulnerability in web administration",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted administrative networks, hosts and users.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22229",
      datePublished: "2022-10-18T02:46:31.075192Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T16:28:28.563Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-0232
Vulnerability from cvelistv5
Published
2021-04-22 19:37
Modified
2024-09-16 23:52
Summary
An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2.
Impacted products
Vendor Product Version
Juniper Networks Paragon Active Assurance Version: unspecified   < 2.35.6
Version: 2.36   < 2.36.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T15:32:10.139Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA11127",
               },
               {
                  name: "FEDORA-2021-761cda0b77",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "Paragon Active Assurance Control Center",
               ],
               product: "Paragon Active Assurance",
               vendor: "Juniper Networks",
               versions: [
                  {
                     lessThan: "2.35.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "2.36.2",
                     status: "affected",
                     version: "2.36",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-04-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284 Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-31T02:06:20",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://kb.juniper.net/JSA11127",
            },
            {
               name: "FEDORA-2021-761cda0b77",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "The following software releases have been updated to resolve this specific issue: 2.35.6, 2.36.2, 3.0.0 and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA11127",
            defect: [
               "NF-5939",
            ],
            discovery: "INTERNAL",
         },
         title: "Paragon Active Assurance: Authentication bypass vulnerability in Control Center",
         workarounds: [
            {
               lang: "en",
               value: "All “register-only” users in the system can be removed until software upgrade.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2021-04-14T16:00:00.000Z",
               ID: "CVE-2021-0232",
               STATE: "PUBLIC",
               TITLE: "Paragon Active Assurance: Authentication bypass vulnerability in Control Center",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Paragon Active Assurance",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "Paragon Active Assurance Control Center",
                                          version_affected: "<",
                                          version_value: "2.35.6",
                                       },
                                       {
                                          platform: "Paragon Active Assurance Control Center",
                                          version_affected: "<",
                                          version_name: "2.36",
                                          version_value: "2.36.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-284 Improper Access Control",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA11127",
                     refsource: "MISC",
                     url: "https://kb.juniper.net/JSA11127",
                  },
                  {
                     name: "FEDORA-2021-761cda0b77",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "The following software releases have been updated to resolve this specific issue: 2.35.6, 2.36.2, 3.0.0 and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA11127",
               defect: [
                  "NF-5939",
               ],
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "All “register-only” users in the system can be removed until software upgrade.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2021-0232",
      datePublished: "2021-04-22T19:37:00.678631Z",
      dateReserved: "2020-10-27T00:00:00",
      dateUpdated: "2024-09-16T23:52:13.134Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21589
Vulnerability from cvelistv5
Published
2024-01-12 00:51
Modified
2024-08-01 22:27
Summary
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information. A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0. This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.
Impacted products
Vendor Product Version
Juniper Networks Paragon Active Assurance Version: 3.2.0   
Version: 3.2.2   
Version: 3.3.0   
Version: 3.3.1   
Version: 3.4.0   
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:34.809Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://supportportal.juniper.net/JSA75727",
               },
               {
                  tags: [
                     "technical-description",
                     "x_transferred",
                  ],
                  url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Paragon Active Assurance",
               vendor: "Juniper Networks",
               versions: [
                  {
                     changes: [
                        {
                           at: "3.1.0",
                           status: "affected",
                        },
                     ],
                     lessThan: "3.1.0",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.2.*",
                     status: "affected",
                     version: "3.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.2.*",
                     status: "affected",
                     version: "3.2.2",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.3.*",
                     status: "affected",
                     version: "3.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.3.*",
                     status: "affected",
                     version: "3.3.1",
                     versionType: "semver",
                  },
                  {
                     lessThan: "3.4.*",
                     status: "affected",
                     version: "3.4.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         datePublic: "2024-01-10T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<p>An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.</p><p>A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.</p><p>Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.</p><p>This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.</p><p>This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.<br></p>\n\n",
                  },
               ],
               value: "\nAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\n\nA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\n\nNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\n\nThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\n\nThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\n\n\n\n\n",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<span style=\"background-color: rgb(28, 30, 31);\">Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</span>\n\n<br>",
                  },
               ],
               value: "\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284 Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-12T00:51:46.607Z",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://supportportal.juniper.net/JSA75727",
            },
            {
               tags: [
                  "technical-description",
               ],
               url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            },
         ],
         solutions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.<br></p>",
                  },
               ],
               value: "This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.\n\n\n",
            },
         ],
         source: {
            advisory: "JSA75727",
            defect: [
               "PAALS-407",
            ],
            discovery: "INTERNAL",
         },
         timeline: [
            {
               lang: "en",
               time: "2024-01-10T17:00:00.000Z",
               value: "Initial Publication",
            },
         ],
         title: "Paragon Active Assurance Control Center: Information disclosure vulnerability",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>There are no known workarounds for this issue.</p>",
                  },
               ],
               value: "There are no known workarounds for this issue.\n\n",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-av217",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2024-21589",
      datePublished: "2024-01-12T00:51:46.607Z",
      dateReserved: "2023-12-27T19:38:25.703Z",
      dateUpdated: "2024-08-01T22:27:34.809Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-22190
Vulnerability from cvelistv5
Published
2022-04-14 15:50
Modified
2024-09-16 22:30
Summary
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0.
References
https://kb.juniper.net/JSA69500x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Paragon Active Assurance Version: 3.1.0
Patch: unspecified
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:07:50.075Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/JSA69500",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Paragon Active Assurance",
               vendor: "Juniper Networks",
               versions: [
                  {
                     status: "affected",
                     version: "3.1.0",
                  },
                  {
                     lessThan: "3.1.0",
                     status: "unaffected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-04-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284 Improper Access Control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-14T15:50:50",
            orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
            shortName: "juniper",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/JSA69500",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.1, 3.2.0, 3.2.1, 3.2.2, and all subsequent releases.",
            },
         ],
         source: {
            advisory: "JSA69500",
            defect: [
               "NF-7783",
            ],
            discovery: "INTERNAL",
         },
         title: "Paragon Active Assurance Control Center: Information disclosure vulnerability in crafted URL",
         workarounds: [
            {
               lang: "en",
               value: "There are no known workarounds for this issue.",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "sirt@juniper.net",
               DATE_PUBLIC: "2022-04-13T16:00:00.000Z",
               ID: "CVE-2022-22190",
               STATE: "PUBLIC",
               TITLE: "Paragon Active Assurance Control Center: Information disclosure vulnerability in crafted URL",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Paragon Active Assurance",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "3.1.0",
                                       },
                                       {
                                          version_affected: "!<",
                                          version_value: "3.1.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Juniper Networks",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.4,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-284 Improper Access Control",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://kb.juniper.net/JSA69500",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/JSA69500",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.1, 3.2.0, 3.2.1, 3.2.2, and all subsequent releases.",
               },
            ],
            source: {
               advisory: "JSA69500",
               defect: [
                  "NF-7783",
               ],
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "There are no known workarounds for this issue.",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968",
      assignerShortName: "juniper",
      cveId: "CVE-2022-22190",
      datePublished: "2022-04-14T15:50:50.767647Z",
      dateReserved: "2021-12-21T00:00:00",
      dateUpdated: "2024-09-16T22:30:37.248Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2021-04-22 20:15
Modified
2024-11-21 05:42
Summary
An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D151D393-E7C6-4BCF-9FEE-DEF6797B6959",
                     versionEndExcluding: "2.35.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "885315E0-A6C2-452D-AB55-A2C43D8A7BE5",
                     versionEndExcluding: "2.36.2",
                     versionStartIncluding: "2.36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An authentication bypass vulnerability in the Juniper Networks Paragon Active Assurance Control Center may allow an attacker with specific information about the deployment to mimic an already registered Test Agent and access its configuration including associated inventory details. If the issue occurs, the affected Test Agent will not be able to connect to the Control Center. This issue affects Juniper Networks Paragon Active Assurance Control Center All versions prior to 2.35.6; 2.36 versions prior to 2.36.2.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de omisión de autenticación en Juniper Networks Paragon Active Assurance Control Center, puede permitir a un atacante con información específica sobre la implementación imitar a un Agente de Prueba ya registrado y acceder a su configuración, incluidos los detalles del inventario asociado.&#xa0;Si ocurre el problema, el Agente de Prueba afectado no será capaz de conectarse al Control Center.&#xa0;Este problema afecta a Juniper Networks Paragon Active Assurance Control Center. Todas las versiones anteriores a 2.35.6;&#xa0;2.36 versiones anteriores a 2.36.2",
      },
   ],
   id: "CVE-2021-0232",
   lastModified: "2024-11-21T05:42:15.790",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.2,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-04-22T20:15:08.707",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11127",
      },
      {
         source: "sirt@juniper.net",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA11127",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-290",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-14 16:15
Modified
2024-11-21 06:46
Summary
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0.
Impacted products
Vendor Product Version
juniper paragon_active_assurance_control_center 3.1.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D33CE1-99FB-4228-A8A2-544E9307E9C9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated attacker to leverage a crafted URL to generate PDF reports, potentially containing sensitive configuration information. A feature was introduced in version 3.1 of the Paragon Active Assurance Control Center which allows users to selective share account data using a unique identifier. Knowing the proper format of the URL and the identifier of an existing object in an application it is possible to get access to that object without being logged in, even if the object is not shared, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance version 3.1.0.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Control de Acceso Inapropiado en Juniper Networks Paragon Active Assurance Control Center permite a un atacante no autenticado aprovechar una URL diseñada para generar informes en PDF, que pueden contener información de configuración confidencial. En la versión 3.1 de Paragon Active Assurance Control Center fue introducida una funcionalidad que permite a usuarios compartir selectivamente los datos de la cuenta usando un identificador único. Conociendo el formato apropiado de la URL y el identificador de un objeto existente en una aplicación es posible conseguir acceso a ese objeto sin estar conectado, incluso si el objeto no es compartido, resultando en una oportunidad de exfiltración maliciosa de los datos del usuario. Tenga en cuenta que la oferta SaaS de Paragon Active Assurance Control Center no está afectada por este problema. Este problema afecta a Juniper Networks Paragon Active Assurance versión 3.1.0",
      },
   ],
   id: "CVE-2022-22190",
   lastModified: "2024-11-21T06:46:21.400",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 4,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-04-14T16:15:08.230",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69500",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69500",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-639",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-12 01:15
Modified
2024-11-21 08:54
Summary
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information. A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data. Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue. This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0. This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D33CE1-99FB-4228-A8A2-544E9307E9C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "352638F4-0F30-4A1F-9D53-E9E2158FA826",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BFFDA27-E44D-4A13-AC78-5E3C82B7B1B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6C0CEF0-22B6-447B-8713-9ACAAA746E27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "88490E55-CB84-41CD-A8D7-BDB24ECC44F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "73DAEB14-AB47-4B8E-B835-98A672FE3516",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "\nAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\n\nA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\n\nNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\n\nThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\n\nThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\n\n\n\n\n",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de control de acceso inadecuado en Juniper Networks Paragon Active Assurance Control Center permite que un atacante basado en red no autenticado acceda a informes sin autenticarse, que potencialmente contienen información de configuración confidencial. Se introdujo una función en la versión 3.1.0 del Centro de control de Paragon Active Assurance que permite a los usuarios compartir datos de cuentas de forma selectiva. Al explotar esta vulnerabilidad, es posible acceder a informes sin iniciar sesión, lo que genera la oportunidad de una filtración maliciosa de los datos del usuario. Tenga en cuenta que la oferta SaaS de Paragon Active Assurance Control Center no se ve afectada por este problema. Este problema afecta a las versiones 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0 de Juniper Networks Paragon Active Assurance. Este problema no afecta a las versiones de Juniper Networks Paragon Active Assurance anteriores a la 3.1.0.",
      },
   ],
   id: "CVE-2024-21589",
   lastModified: "2024-11-21T08:54:40.180",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 4,
            source: "sirt@juniper.net",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-12T01:15:46.493",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA75727",
      },
      {
         source: "sirt@juniper.net",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://supportportal.juniper.net/JSA75727",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-10-18 03:15
Modified
2024-11-21 06:46
Summary
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF20EF2F-C73D-40F1-A14A-B2ECDBA5F31B",
                     versionEndExcluding: "3.1.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:paragon_active_assurance_control_center:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "352638F4-0F30-4A1F-9D53-E9E2158FA826",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability, a stored XSS (or persistent), in the Control Center Controller web pages of Juniper Networks Paragon Active Assurance (Formerly Netrounds) allows a high-privilege attacker with 'WRITE' permissions to store one or more malicious scripts that will infect any other authorized user's account when they accidentally trigger the malicious script(s) while managing the device. Triggering these attacks enables the attacker to execute commands with the permissions up to that of the superuser account. This issue affects: Juniper Networks Paragon Active Assurance (Formerly Netrounds) All versions prior to 3.1.1; 3.2 versions prior to 3.2.1.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Neutralización Inapropiada de la Entrada Durante la Generación de la Página Web (\"Cross-site Scripting\"), un ataque de tipo XSS almacenado (o persistente), en las páginas web del Control Center Controller de Juniper Networks Paragon Active Assurance (anteriormente Netrounds) permite a un atacante de alto privilegio con permisos \"WRITE\" almacenar uno o más scripts maliciosos que infectarán la cuenta de cualquier otro usuario autorizado cuando accidentalmente desencadene el o los scripts maliciosos mientras administra el dispositivo. El desencadenamiento de estos ataques permite al atacante ejecutar comandos con los permisos hasta los de la cuenta de super usuario. Este problema afecta a: Juniper Networks Paragon Active Assurance (anteriormente Netrounds) Todas las versiones anteriores a 3.1.1; versiones 3.2 anteriores a 3.2.1",
      },
   ],
   id: "CVE-2022-22229",
   lastModified: "2024-11-21T06:46:26.530",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.4,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.7,
            impactScore: 6,
            source: "sirt@juniper.net",
            type: "Primary",
         },
      ],
   },
   published: "2022-10-18T03:15:10.130",
   references: [
      {
         source: "sirt@juniper.net",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69883",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://kb.juniper.net/JSA69883",
      },
   ],
   sourceIdentifier: "sirt@juniper.net",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "sirt@juniper.net",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}