cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-2973,https://securityvulnerability.io/vulnerability/CVE-2024-2973,Authentication Bypass Using Alternate Path or Channel Vulnerability Affects Juniper Networks Routers and Conductors,"A critical vulnerability affecting Juniper Networks routers, identified as CVE-2024-2973, has been discovered, allowing an authentication bypass when running with a redundant peer. This vulnerability affects Session Smart Router versions before 5.6.15, from 6.0 before 6.1.9-lts, and from 6.2 before 6.2.5-sts, as well as Session Smart Conductor versions before 5.6.15, from 6.0 before 6.1.9-lts, and 6.2 before 6.2.5-sts, and WAN Assurance Router versions 6.0 before 6.1.9-lts and 6.2 before 6.2.5-sts. Emergency patches have been released by Juniper Networks to fix this vulnerability, and there have been no reported instances of exploitation in the wild. Juniper Networks Security Incident Response Team has not detected any threat, and the company has swiftly responded by issuing updates and providing guidance for users to update their systems.",Juniper Networks,"Session Smart Router,Session Smart Conductor,Wan Assurance Router",10,CRITICAL,0.0004299999854993075,false,true,false,true,,false,false,2024-06-27T21:15:00.000Z,0