First published: Tue Jan 15 2019(Updated: )
On Juniper ATP, secret passphrase CLI inputs, such as "set mcm", are logged to /var/log/syslog in clear text, allowing authenticated local user to be able to view these secret information. This issue affects Juniper ATP 5.0 versions prior to 5.0.4.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Advanced Threat Prevention | >=5.0.0<5.0.4 | |
Juniper Atp400 | ||
Juniper Atp700 |
The following software release have been updated to resolve this specific issue: 5.0.4 and all subsequent releases. It is also recommended to purge the affected log files and/or change the passphrase after the upgrade.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.