First published: Thu Apr 14 2022(Updated: )
An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Contrail Service Orchestration | =6.0.0 | |
Juniper Contrail Service Orchestration | =6.0.0-patch1 | |
Juniper Contrail Service Orchestration | =6.0.0-patch2 |
The following software releases have been updated to resolve these specific issues: On-premises: Contrail Service Orchestration 6.0.0 Patch v3, 6.1.0, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22189 has a high severity rating due to its potential for local privilege escalation.
To mitigate CVE-2022-22189, apply the latest patches provided by Juniper for Contrail Service Orchestration version 6.0.0.
CVE-2022-22189 affects users of Juniper Networks Contrail Service Orchestration versions 6.0.0, 6.0.0-patch1, and 6.0.0-patch2.
CVE-2022-22189 is classified as an Incorrect Ownership Assignment vulnerability.
CVE-2022-22189 requires local authentication, meaning it cannot be exploited remotely.