CVE-2024-30406

A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials. This issue affects only Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO.  This issue does not affect releases before 23.1R1-EVO.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:juniper:paragon_active_assurance_test_agent:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*
OR cpe:2.3:h:juniper:acx5448:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx5448-d:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx5448-m:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7020:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7024:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7024x:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx710:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7300:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7509:-:*:*:*:*:*:*:*

History

23 Jan 2026, 16:28

Type Values Removed Values Added
CPE cpe:2.3:o:juniper:junos_os_evolved:23.1:-:*:*:*:*:*:*
cpe:2.3:h:juniper:acx5448-d:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7509:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx5448-m:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7024:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7024x:-:*:*:*:*:*:*:*
cpe:2.3:a:juniper:paragon_active_assurance_test_agent:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7100:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.1:r1:*:*:*:*:*:*
cpe:2.3:h:juniper:acx5448:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx710:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7020:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*
cpe:2.3:h:juniper:acx7300:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*
First Time Juniper paragon Active Assurance Test Agent
Juniper acx7300
Juniper acx5448-m
Juniper
Juniper acx5448
Juniper junos Os Evolved
Juniper acx7024
Juniper acx7100
Juniper acx7509
Juniper acx7020
Juniper acx7024x
Juniper acx5448-d
Juniper acx710
References () https://supportportal.juniper.net/JSA79104 - () https://supportportal.juniper.net/JSA79104 - Vendor Advisory
References () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N - () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N - Vendor Advisory
References () https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html - () https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html - Technical Description
References () https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html - () https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html - Third Party Advisory

21 Nov 2024, 09:11

Type Values Removed Values Added
References () https://supportportal.juniper.net/JSA79104 - () https://supportportal.juniper.net/JSA79104 -
References () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N - () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N -
References () https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html - () https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html -
References () https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html - () https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html -

16 May 2024, 21:16

Type Values Removed Values Added
References
  • {'url': 'https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/RE:M/U:Green', 'source': 'sirt@juniper.net'}
  • () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N -
Summary (en) A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials. This issue affects only Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO.  This issue does not affect releases before 23.1R1-EVO. (en) A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials. This issue affects only Juniper Networks Junos OS Evolved ACX Series devices using the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO.  This issue does not affect releases before 23.1R1-EVO.

12 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-12 15:15

Updated : 2026-01-23 16:28


NVD link : CVE-2024-30406

Mitre link : CVE-2024-30406

CVE.ORG link : CVE-2024-30406


JSON object : View

Products Affected

juniper

  • paragon_active_assurance_test_agent
  • acx7509
  • acx7024
  • acx5448
  • acx7100
  • acx5448-d
  • acx5448-m
  • acx7020
  • acx710
  • junos_os_evolved
  • acx7024x
  • acx7300
CWE
CWE-313

Cleartext Storage in a File or on Disk