Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2018-0863 | Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana. |
Fixes
Solution
This issue is fixed in Contrail Service Orchestration 4.0.0 and subsequent releases.
Workaround
Limit access to the CSO environment to only trusted networks and hosts. Disable Grafana service as it is not required by CSO.
References
Link | Providers |
---|---|
https://kb.juniper.net/JSA10872 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T18:18:58.831Z
Reserved: 2017-11-16T00:00:00
Link: CVE-2018-0039

No data.

Status : Modified
Published: 2018-07-11T18:29:00.823
Modified: 2024-11-21T03:37:24.573
Link: CVE-2018-0039

No data.

No data.