First published: Wed Jul 11 2018(Updated: )
Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Contrail Service Orchestration | <4.0.0 |
This issue is fixed in Contrail Service Orchestration 4.0.0 and subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0039 is categorized as a high-severity vulnerability due to its potential for unauthorized access to sensitive information.
To fix CVE-2018-0039, it is essential to upgrade to Juniper Networks Contrail Service Orchestration version 4.0.0 or later.
CVE-2018-0039 affects all versions of Juniper Networks Contrail Service Orchestration prior to 4.0.0.
CVE-2018-0039 enables network-based attackers to gain unauthorized access to information in Grafana due to hardcoded credentials.
A temporary workaround for CVE-2018-0039 involves disabling the Grafana service, but upgrading is the recommended solution.