First published: Tue Jan 15 2019(Updated: )
Juniper ATP ships with hard coded credentials in the Web Collector instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Advanced Threat Protection | >=5.0.0<5.0.3 | |
Juniper ATP400 | ||
Juniper ATP700 |
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0020 is considered to have a high severity due to the presence of hard coded credentials allowing full control over installations.
To fix CVE-2019-0020, update to Juniper ATP version 5.0.3 or later, where the hard coded credentials have been removed.
CVE-2019-0020 affects Juniper Networks Advanced Threat Prevention versions up to 5.0.2.
Yes, CVE-2019-0020 can be exploited remotely due to the hard coded credentials accessible over the web interface.
There are no specific workarounds for CVE-2019-0020; upgrading to a safe version is the recommended action.