Juniper Networks 9.3R1 CTPView Server Software
About This Guide
This release notes accompany Release 9.3R1 of the CTPView software. They describe device documentation and known problems with the software. You can also find these release notes on the Juniper Networks CTP software documentation webpage, which is located at CTP Series Release Notes.
Release Highlights
The following features or enhancements have been added to CTPView Release 9.3R1.
- You can now host CTPView 9.3R1 Server on RHEL9 or Rocky Linux9 instead of Centos 7.
- SAToP bundles will now interoperate with Cisco devices.
Resolved Issues in CTPView Release 9.3R1
The following issues have been resolved in CTPView Release 9.3R1.
- Save/Restore CTP configuration feature is not able configure in CTPView [PR 1841562]
- CTP-VIEW issues need to fix in 9.3R1 [PR 1852286]
- CTPVIEW issues need to fix in 9.3R1 [PR 1854729]
- CTPView GUI after connected ctpos node, Performance getting slow in CTPView 9.3R1 build [PR 1857545]
- Network Monitoring is not getting Start in CTPView GUI 9.3R1 build [PR 1857551]
- NTP sync issue & plots are not getting generated in CTPView GUI 9.3R1 build. [PR 1857570]
- Unable to enable 32 KHZ reference output option in node config page in CTPView 9.3R1 [PR 1857571]
- Submitting save node configuration from CTPView 9.3R1 Node maintenance displays empty page. [PR 1857577]
- Radius & Tacacs Authentication failed & MS card CESoPSN bundle not working. [PR 1858914]
Known Issues in CTPView Release 9.3R1
The following PRs are known issues.
- SSH fails after CTP151 dual upgrade to CTPOS 9.2R1 from CTPView. [PR 1830027]
- Add support for more special characters in CTP View GUI system configuration page for various CTP applications [PR 1847606]
- NOTE: You cannot configure PBS in CTPView 9.3R1.
Required Install files
It is your responsibility to install either the RHEL9.5 (licensed version) or Rocky Linux 9.5 (open source) OS for hosting CTPView 9.3R1 Server. If you have queries or need further assistance, contact Juniper Networks Technical Assistance Center (JTAC). Following file is provided for installing the CTPView software:
Table 1:
File | CTPView Server OS | Filename | Checksum |
Software and RHEL9.5 (licensed version) or Rocky Linux 9.5 (open source) OS updates | RHEL9.5 (licensed version) or Rocky Linux
9.5 (open source) OS |
CTPView-9.3R-1.0.el9.x8
6_64.rpm |
924bec9ae64fe2767b42 25ffa3e6a0e9 |
Recommended System Configuration for Hosting a CTPView Server
The following are the recommended hardware configuration to setup a CTPView 9.3R1 server:
- RHEL9.5 (licensed version) or Rocky Linux 9.5 (open source) OS
- 1x processor (4 cores)
- 8 GB RAM
- Number of NICs – 2
- 80 GB Disk space
CTPView Installation and Maintenance Policy
From the release of CTPView 9.0R1, Juniper Networks has adopted a policy for installation and maintenance of the CTPView server. CTPView is now being distributed as an “Application only” product, in the form of an RPM package. You can now install and maintain the OS (RHEL 9.5 or Rocky Linux 9.5) according to the guidelines described in Installing CTPView 9.3R1 Server Operating System and CTPView Network Management System Software. This administration guide also has the complete installation procedure.
NOTE: From the release of CTPView 9.3R1, either RHEL 9.5 (licensed) or Rocky Linux 9.5 (open source) OS should be used to host CTPView server.
CVEs and Security Vulnerabilities Addressed in CTPView Release 9.3R1
The following tables list the CVEs and security vulnerabilities that have been addressed in CTPView 9.3R1. For more information about individual CVEs, see http://web.nvd.nist.gov/view/vuln/search.
Table 2: Critical or Important CVEs Included in perl
CVE-2023-47038
Table 3: Critical or Important CVEs Included in emacs
CVE-2024-39331
Table 4: Critical or Important CVEs Included in krb5
CVE-2024-3596
Table 5: Critical or Important CVEs Included in python3
CVE-2024-6232
Table 6: Critical or Important CVEs Included in rhc
CVE-2022-3064
Table 7: Critical or Important CVEs Included in kernel
CVE-2024-41009 | CVE-2024-42244 | CVE-2024-50226 | CVE-2024-26615 | CVE-2024-43854 |
CVE-2024-44994 | CVE-2024-45018 | CVE-2024-46695 | CVE-2024-49949 | CVE-2024-50251 |
CVE-2024-27399 | CVE-2024-38564 | CVE-2024-45020 | CVE-2024-46697 | CVE-2024-47675 |
CVE-2024-49888 | CVE-2024-50099 | CVE-2024-50110 | CVE-2024-50115 | CVE-2024-50124 |
CVE-2024-50125 | CVE-2024-50142 | CVE-2024-50148 | CVE-2024-50192 | CVE-2024-50223 |
CVE-2024-50255 | CVE-2024-50262 | CVE-2024-46713 | CVE-2024-50208 | CVE-2024-50252 |
CVE-2024-53122 | CVE-2024-50154 | CVE-2024-50275 | CVE-2024-53088 |
Table 8: Critical or Important CVEs Included in net-snmp
CVE-2022-24805 | CVE-2022-24806 | CVE-2022-24807 | CVE-2022-24808 | CVE-2022-24809 |
CVE-2022-24810 |
Table 9: Critical or Important CVEs Included in pam
CVE-2024-10041
Table 10: Critical or Important CVEs Included in NetworkManager
CVE-2024-3661
Table 11: Critical or Important CVEs Included in rsync
CVE-2024-12085
Revision History
January 2025—Revision 1—CTPView Release 9.3R1
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2025 Juniper Networks, Inc. All rights reserved.
Documents / Resources
![]() |
Juniper Networks 9.3R1 CTPView Server Software [pdf] User Guide 9.3R1 CTPView Server Software, 9.3R1, CTPView Server Software, Server Software, Software |
![]() |
Juniper NETWORKS 9.3R1 CTPView Server Software [pdf] User Guide CTP151, 9.3R1 CTPView Server Software, 9.3R1, CTPView Server Software, Server Software, Software |