First published: Wed Jan 19 2022(Updated: )
A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Contrail Service Orchestration | <=6.0.0 | |
Juniper Contrail Service Orchestration | =6.1.0 | |
Juniper Contrail Service Orchestration | =6.1.0-patch1 | |
Juniper Contrail Service Orchestration | =6.1.0-patch2 |
The following software releases have been updated to resolve these specific issues: Juniper Networks Contrail Service Orchestration (CSO) 6.1.0 Patch 3, 6.2.0, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22152 is categorized as a critical vulnerability due to its potential for tenant information leakage.
To remediate CVE-2022-22152, update the Juniper Contrail Service Orchestration to the latest version or apply the necessary patches.
CVE-2022-22152 affects Juniper Contrail Service Orchestration versions up to 6.0.0 and 6.1.0, including its patch versions.
CVE-2022-22152 is classified as a Protection Mechanism Failure vulnerability in the REST API.
Yes, CVE-2022-22152 can lead to unauthorized access to confidential configuration details across tenants, increasing the risk of data breaches.