First published: Tue Jan 15 2019(Updated: )
Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Advanced Threat Protection | >=5.0.0<5.0.3 | |
Juniper ATP400 | ||
Juniper ATP700 |
The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0022 is considered a high severity vulnerability due to hard coded credentials allowing full control of the software.
To fix CVE-2019-0022, upgrade Juniper ATP to version 5.0.3 or later.
CVE-2019-0022 affects Juniper ATP versions prior to 5.0.3.
The risks include unauthorized access and control over installations of Juniper ATP, potentially compromising network security.
You can check if your device is vulnerable by verifying the installed version of Juniper ATP and comparing it to the affected version range.