"value":"The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks\u00a0Juniper Cloud Native Router (JCNR)\u00a0and\u00a0containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container. \n\nDue to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.\u00a0\n\nThis issue affects Juniper Networks JCNR:\n * All versions before 23.4.\n\n\nThis issue affects Juniper Networks cRPD:\n * All versions before 23.4R1."
"value":"<p>Remove the hard coded keys using:</p><code> "rm -rf /etc/ssh/ssh_host_*" </code><br/><p>and then run </p><code> "ssh-keygen -A" </code><br/><p>to generate new host keys.</p>"
}
],
"value":"Remove the hard coded keys using:\n\n \"rm -rf /etc/ssh/ssh_host_*\" \nand then run \n\n \"ssh-keygen -A\" \nto generate new host keys."
"value":"<p>The following software releases have been updated to resolve this specific issue: </p><p>JCNR: 23.4, and all subsequent releases.</p><p>cRPD: 23.4R1, and all subsequent releases.<br><br></p>"
"value":"The following software releases have been updated to resolve this specific issue:\u00a0\n\nJCNR: 23.4, and all subsequent releases.\n\ncRPD: 23.4R1, and all subsequent releases."