CVE-2024-21589 (GCVE-0-2024-21589)
Vulnerability from cvelistv5 – Published: 2024-01-12 00:51 – Updated: 2025-06-17 21:09
VLAI?
Title
Paragon Active Assurance Control Center: Information disclosure vulnerability
Summary
An Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.
A feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.
Note that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.
This issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.
This issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.
Severity ?
7.4 (High)
CWE
- CWE-284 - Improper Access Control
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Juniper Networks | Paragon Active Assurance |
Unaffected:
0 , < 3.1.0
(semver)
Affected: 3.2.0 , < 3.2.* (semver) Affected: 3.2.2 , < 3.2.* (semver) Affected: 3.3.0 , < 3.3.* (semver) Affected: 3.3.1 , < 3.3.* (semver) Affected: 3.4.0 , < 3.4.* (semver) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:27:34.809Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://supportportal.juniper.net/JSA75727"
},
{
"tags": [
"technical-description",
"x_transferred"
],
"url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21589",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-12T16:08:30.065911Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-17T21:09:19.160Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Paragon Active Assurance",
"vendor": "Juniper Networks",
"versions": [
{
"changes": [
{
"at": "3.1.0",
"status": "affected"
}
],
"lessThan": "3.1.0",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "3.2.*",
"status": "affected",
"version": "3.2.0",
"versionType": "semver"
},
{
"lessThan": "3.2.*",
"status": "affected",
"version": "3.2.2",
"versionType": "semver"
},
{
"lessThan": "3.3.*",
"status": "affected",
"version": "3.3.0",
"versionType": "semver"
},
{
"lessThan": "3.3.*",
"status": "affected",
"version": "3.3.1",
"versionType": "semver"
},
{
"lessThan": "3.4.*",
"status": "affected",
"version": "3.4.0",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-01-10T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cp\u003eAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\u003c/p\u003e\u003cp\u003eA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\u003c/p\u003e\u003cp\u003eNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\u003c/p\u003e\u003cp\u003eThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\u003c/p\u003e\u003cp\u003eThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\u003cbr\u003e\u003c/p\u003e\n\n"
}
],
"value": "\nAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\n\nA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\n\nNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\n\nThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\n\nThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\n\n\n\n\n"
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(28, 30, 31);\"\u003eJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-12T00:51:46.607Z",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://supportportal.juniper.net/JSA75727"
},
{
"tags": [
"technical-description"
],
"url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThis issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.\u003cbr\u003e\u003c/p\u003e"
}
],
"value": "This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.\n\n\n"
}
],
"source": {
"advisory": "JSA75727",
"defect": [
"PAALS-407"
],
"discovery": "INTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2024-01-10T17:00:00.000Z",
"value": "Initial Publication"
}
],
"title": "Paragon Active Assurance Control Center: Information disclosure vulnerability",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThere are no known workarounds for this issue.\u003c/p\u003e"
}
],
"value": "There are no known workarounds for this issue.\n\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-av217"
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2024-21589",
"datePublished": "2024-01-12T00:51:46.607Z",
"dateReserved": "2023-12-27T19:38:25.703Z",
"dateUpdated": "2025-06-17T21:09:19.160Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"Paragon Active Assurance\", \"vendor\": \"Juniper Networks\", \"versions\": [{\"changes\": [{\"at\": \"3.1.0\", \"status\": \"affected\"}], \"lessThan\": \"3.1.0\", \"status\": \"unaffected\", \"version\": \"0\", \"versionType\": \"semver\"}, {\"lessThan\": \"3.2.*\", \"status\": \"affected\", \"version\": \"3.2.0\", \"versionType\": \"semver\"}, {\"lessThan\": \"3.2.*\", \"status\": \"affected\", \"version\": \"3.2.2\", \"versionType\": \"semver\"}, {\"lessThan\": \"3.3.*\", \"status\": \"affected\", \"version\": \"3.3.0\", \"versionType\": \"semver\"}, {\"lessThan\": \"3.3.*\", \"status\": \"affected\", \"version\": \"3.3.1\", \"versionType\": \"semver\"}, {\"lessThan\": \"3.4.*\", \"status\": \"affected\", \"version\": \"3.4.0\", \"versionType\": \"semver\"}]}], \"datePublic\": \"2024-01-10T17:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\\n\\n\u003cp\u003eAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\u003c/p\u003e\u003cp\u003eA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\u003c/p\u003e\u003cp\u003eNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\u003c/p\u003e\u003cp\u003eThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\u003c/p\u003e\u003cp\u003eThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\u003cbr\u003e\u003c/p\u003e\\n\\n\"}], \"value\": \"\\nAn Improper Access Control vulnerability in the Juniper Networks Paragon Active Assurance Control Center allows an unauthenticated network-based attacker to access reports without authenticating, potentially containing sensitive configuration information.\\n\\nA feature was introduced in version 3.1.0 of the Paragon Active Assurance Control Center which allows users to selectively share account data. By exploiting this vulnerability, it is possible to access reports without being logged in, resulting in the opportunity for malicious exfiltration of user data.\\n\\nNote that the Paragon Active Assurance Control Center SaaS offering is not affected by this issue.\\n\\nThis issue affects Juniper Networks Paragon Active Assurance versions 3.1.0, 3.2.0, 3.2.2, 3.3.0, 3.3.1, 3.4.0.\\n\\nThis issue does not affect Juniper Networks Paragon Active Assurance versions earlier than 3.1.0.\\n\\n\\n\\n\\n\"}], \"exploits\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(28, 30, 31);\\\"\u003eJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\u003c/span\u003e\\n\\n\u003cbr\u003e\"}], \"value\": \"\\nJuniper SIRT is not aware of any malicious exploitation of this vulnerability.\\n\\n\\n\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 7.4, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"scope\": \"CHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-284\", \"description\": \"CWE-284 Improper Access Control\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2024-01-12T00:51:46.607Z\"}, \"references\": [{\"tags\": [\"vendor-advisory\"], \"url\": \"https://supportportal.juniper.net/JSA75727\"}, {\"tags\": [\"technical-description\"], \"url\": \"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\"}], \"solutions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cp\u003eThis issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.\u003cbr\u003e\u003c/p\u003e\"}], \"value\": \"This issue has been resolved in the following software releases: Paragon Active Assurance 3.1.2, 3.2.3, 3.3.2, 3.4.1, 4.0.0, 4.1.0 and all subsequent releases.\\n\\n\\n\"}], \"source\": {\"advisory\": \"JSA75727\", \"defect\": [\"PAALS-407\"], \"discovery\": \"INTERNAL\"}, \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-01-10T17:00:00.000Z\", \"value\": \"Initial Publication\"}], \"title\": \"Paragon Active Assurance Control Center: Information disclosure vulnerability\", \"workarounds\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cp\u003eThere are no known workarounds for this issue.\u003c/p\u003e\"}], \"value\": \"There are no known workarounds for this issue.\\n\\n\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-av217\"}}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21589\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-01-12T16:08:30.065911Z\"}}}], \"providerMetadata\": {\"shortName\": \"CISA-ADP\", \"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"dateUpdated\": \"2025-06-17T21:07:36.786Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
"cveMetadata": "{\"cveId\": \"CVE-2024-21589\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"juniper\", \"dateReserved\": \"2023-12-27T19:38:25.703Z\", \"datePublished\": \"2024-01-12T00:51:46.607Z\", \"dateUpdated\": \"2024-08-01T22:27:34.809Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…