CVE-2021-0232 in Juniper Networks and Fedora Project Products
Published on April 22, 2021
Paragon Active Assurance: Authentication bypass vulnerability in Control Center
Vulnerability Analysis
CVE-2021-0232 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity, and a high impact on availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2021-0232 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2021-0232
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-0232 are published in these products:
Affected Versions
Juniper Networks Paragon Active Assurance:- Version unspecified and below 2.35.6 is affected.
- Version 2.36 and below 2.36.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.