First published: Wed Jul 11 2018(Updated: )
Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 have Cassandra service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Cassandra.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Contrail Service Orchestration | <3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0038 is classified as a critical severity vulnerability due to hardcoded credentials allowing unauthorized access to sensitive data.
To fix CVE-2018-0038, upgrade to Juniper Contrail Service Orchestration version 3.3.0 or later where the vulnerability is resolved.
CVE-2018-0038 affects Juniper Networks Contrail Service Orchestration releases prior to version 3.3.0.
Yes, CVE-2018-0038 can be exploited remotely by attackers on the network due to the exposure of hardcoded credentials.
CVE-2018-0038 puts the information stored in the Cassandra database at risk, potentially allowing unauthorized access to sensitive information.