CVE-2021-0232 in Juniper Networks and Fedora Project Products
Published on April 22, 2021
Paragon Active Assurance: Authentication bypass vulnerability in Control Center
Vulnerability Analysis
CVE-2021-0232 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity, and a high impact on availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2021-0232 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2021-0232
stack.watch emails you whenever new vulnerabilities are published in Juniper Networks Paragon Active Assurance Control Center or Fedora Project Fedora. Just hit a watch button to start following.
Affected Versions
Juniper Networks Paragon Active Assurance:- Version unspecified and below 2.35.6 is affected.
- Version 2.36 and below 2.36.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.