cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-2973,https://securityvulnerability.io/vulnerability/CVE-2024-2973,Authentication Bypass Using Alternate Path or Channel Vulnerability Affects Juniper Networks Routers and Conductors,"A critical vulnerability affecting Juniper Networks routers, identified as CVE-2024-2973, has been discovered, allowing an authentication bypass when running with a redundant peer. This vulnerability affects Session Smart Router versions before 5.6.15, from 6.0 before 6.1.9-lts, and from 6.2 before 6.2.5-sts, as well as Session Smart Conductor versions before 5.6.15, from 6.0 before 6.1.9-lts, and 6.2 before 6.2.5-sts, and WAN Assurance Router versions 6.0 before 6.1.9-lts and 6.2 before 6.2.5-sts. Emergency patches have been released by Juniper Networks to fix this vulnerability, and there have been no reported instances of exploitation in the wild. Juniper Networks Security Incident Response Team has not detected any threat, and the company has swiftly responded by issuing updates and providing guidance for users to update their systems.",Juniper Networks,"Session Smart Router,Session Smart Conductor,Wan Assurance Router",10,CRITICAL,0.0004299999854993075,false,true,false,true,,false,false,2024-06-27T21:15:00.000Z,0 CVE-2021-31349,https://securityvulnerability.io/vulnerability/CVE-2021-31349,Session Smart Router: Authentication Bypass Vulnerability,"The usage of an internal HTTP header created an authentication bypass vulnerability (CWE-287), allowing an attacker to view internal files, change settings, manipulate services and execute arbitrary code. This issue affects all Juniper Networks 128 Technology Session Smart Router versions prior to 4.5.11, and all versions of 5.0 up to and including 5.0.1.",Juniper Networks,128 Technology Session Smart Router,9.8,CRITICAL,0.004009999800473452,false,false,false,false,,false,false,2021-10-19T19:15:00.000Z,0