Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2017-2263 | The ifmap service that comes bundled with Juniper Networks Contrail releases uses hard coded credentials. Affected releases are Contrail releases 2.2 prior to 2.21.4; 3.0 prior to 3.0.3.4; 3.1 prior to 3.1.4.0; 3.2 prior to 3.2.5.0. CVE-2017-10616 and CVE-2017-10617 can be chained together and have a combined CVSSv3 score of 5.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N). |
Solution
The following software releases have been updated to resolve these specific issues: Contrail 2.21.4, 3.0.3.4, 3.1.4.0, 3.2.5.0 and all subsequent releases.
Workaround
The hard coded credentials can be modified manually. It is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access only from trusted, administrative networks or hosts.
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T04:19:11.053Z
Reserved: 2017-06-28T00:00:00
Link: CVE-2017-10616

No data.

Status : Deferred
Published: 2017-10-13T17:29:00.783
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-10616

No data.

No data.