CVE-2021-0232

7.4 HIGH

📋 TL;DR

An authentication bypass vulnerability in Juniper Networks Paragon Active Assurance Control Center allows attackers with specific deployment information to impersonate registered Test Agents and access their configurations and inventory details. This affects all versions prior to 2.35.6 and 2.36 versions prior to 2.36.2. Successful exploitation prevents affected Test Agents from connecting to the Control Center.

💻 Affected Systems

Products:
  • Juniper Networks Paragon Active Assurance Control Center
Versions: All versions prior to 2.35.6; 2.36 versions prior to 2.36.2
Operating Systems: Not OS-specific - affects the application itself
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have specific information about the deployment to mimic Test Agents.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to Test Agent configurations and inventory details, potentially compromising network testing infrastructure and enabling lateral movement.

🟠

Likely Case

Unauthorized access to Test Agent configurations leading to information disclosure and disruption of testing operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM - Requires specific deployment knowledge but could be exploited if Control Center is internet-accessible.
🏢 Internal Only: HIGH - Internal attackers with deployment knowledge could easily exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific deployment knowledge to mimic Test Agents, making it more targeted than widespread attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.35.6 or 2.36.2

Vendor Advisory: https://kb.juniper.net/JSA11127

Restart Required: Yes

Instructions:

1. Download the patched version (2.35.6 or 2.36.2) from Juniper support portal. 2. Backup current configuration. 3. Install the update following Juniper's upgrade documentation. 4. Restart the Control Center services.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Control Center and Test Agents from untrusted networks to limit attack surface.

Access Control Restrictions

all

Implement strict network access controls to limit who can communicate with Control Center and Test Agents.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Control Center and Test Agents
  • Monitor for unauthorized Test Agent registration attempts and connection failures

🔍 How to Verify

Check if Vulnerable:

Check Control Center version via web interface or CLI. Versions below 2.35.6 or 2.36.2 are vulnerable.

Check Version:

Check via Control Center web interface or consult Juniper documentation for CLI version check commands specific to your deployment.

Verify Fix Applied:

Verify version is 2.35.6 or higher (for 2.35.x branch) or 2.36.2 or higher (for 2.36.x branch). Test Agent connections should function normally.

📡 Detection & Monitoring

Log Indicators:

  • Failed Test Agent connections
  • Unauthorized Test Agent registration attempts
  • Multiple connection attempts from unknown sources

Network Indicators:

  • Unusual traffic patterns between Test Agents and Control Center
  • Connection attempts from unexpected IP addresses

SIEM Query:

source="paragon-control-center" AND (event_type="connection_failure" OR event_type="unauthorized_registration")

🔗 References

📤 Share & Export