


Ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. An indicator of compromise can be seen by first determining if the NETCONF client is logged in and fails to log out after a reasonable period of time and secondly reviewing the WCPU percentage for the mgd process by running the following command: mgd process example: show system processes extensive | match "mgd|PID" | except last PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND 92476 root 100 0 500M 89024K CPU3 3 57.5H 89.60% mgd :\etc\connectrc` files on multi-user machines. Juniper Networks Junos OS Evolved * All versions prior to 21.4R3-S4-EVO * 22.1 versions prior to 22.1R3-S2-EVO * 22.2 versions prior to 22.2R3-EVO * 22.3 versions prior to 22.3R3-EVO * 22.4 versions prior to 22.4R2-EVO. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluatedĪn Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU Denial of Service to the device's control plane. This is only exposed when ssh debug is enabled. The BIG-IP SPK TMM (Traffic Management Module) f5-debug-sidecar and f5-debug-sshd containers contains hardcoded credentials that may allow an attacker with the ability to intercept traffic to impersonate the SPK Secure Shell (SSH) server on those containers.
