First published: Wed Jul 11 2018(Updated: )
Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 use hardcoded credentials to access Keystone service. These credentials allow network based attackers unauthorized access to information stored in keystone.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Contrail Service Orchestration | <3.3.0 |
This issue is fixed in Contrail Service Orchestration 3.3.0 and subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0041 has a high severity rating due to the use of hardcoded credentials, enabling unauthorized access to sensitive information.
To fix CVE-2018-0041, upgrade your Juniper Networks Contrail Service Orchestration to version 3.3.0 or later.
CVE-2018-0041 affects all versions of Juniper Contrail Service Orchestration prior to 3.3.0.
CVE-2018-0041 puts information stored in the Keystone service at risk due to unauthorized access from attackers.
Organizations using affected versions of Juniper Networks Contrail Service Orchestration are impacted by CVE-2018-0041.