CVE-2023-28971
📋 TL;DR
This vulnerability allows attackers to bypass firewall rules that restrict communication between Test Agents and the Control Center in Juniper Paragon Active Assurance on-prem deployments. When the optional timescaledb container is started, it creates unintended network routes that enable unauthorized communication between Test Agents. Only customers hosting their own on-prem Control Center with timescaledb enabled are affected.
💻 Affected Systems
- Juniper Networks Paragon Active Assurance (PAA) (formerly Netrounds)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could pivot between Test Agents to access restricted internal services, potentially leading to lateral movement, data exfiltration, or disruption of testing operations.
Likely Case
Unauthorized communication between Test Agents allowing bypass of intended network segmentation and security controls.
If Mitigated
Limited impact if proper network segmentation and additional firewall rules are in place beyond the vulnerable system's controls.
🎯 Exploit Status
Exploitation requires access to the internal network where Test Agents operate and knowledge of the timescaledb feature's impact.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.1.2
Vendor Advisory: https://supportportal.juniper.net/JSA70595
Restart Required: Yes
Instructions:
1. Upgrade Paragon Active Assurance Control Center to version 4.1.2 or later. 2. Restart the Control Center services. 3. Verify that timescaledb container no longer creates unintended network routes.
🔧 Temporary Workarounds
Disable timescaledb container
linuxStop and disable the optional timescaledb container to prevent the firewall bypass.
docker stop timescaledb
docker rm timescaledb
systemctl disable timescaledb.service
Implement additional firewall rules
linuxAdd explicit firewall rules to block communication between Test Agents (100.70.0.0/16 range) beyond intended services.
iptables -A FORWARD -s 100.70.0.0/16 -d 100.70.0.0/16 -j DROP
🧯 If You Can't Patch
- Disable the timescaledb feature if not required for operations
- Implement network segmentation and additional firewall rules to restrict Test Agent communications
🔍 How to Verify
Check if Vulnerable:
Check if running PAA version prior to 4.1.2 and if timescaledb container is running: docker ps | grep timescaledb
Check Version:
Check PAA Control Center version in web interface or application logs
Verify Fix Applied:
Verify PAA version is 4.1.2 or later and test that Test Agents cannot communicate directly with each other beyond intended services.
📡 Detection & Monitoring
Log Indicators:
- Unexpected network connections between Test Agent IPs (100.70.x.x)
- Timescaledb container startup logs
- Firewall rule bypass events
Network Indicators:
- Unauthorized traffic between 100.70.0.0/16 addresses
- Test Agents communicating on unexpected ports
SIEM Query:
source_ip IN (100.70.0.0/16) AND dest_ip IN (100.70.0.0/16) AND NOT dest_port IN (allowed_ports)