Description
Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana.
No analysis available yet.
Remediation
Vendor Solution
This issue is fixed in Contrail Service Orchestration 4.0.0 and subsequent releases.
Vendor Workaround
Limit access to the CSO environment to only trusted networks and hosts. Disable Grafana service as it is not required by CSO.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0863 | Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana. |
References
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA10872 |
|
History
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T18:18:58.831Z
Reserved: 2017-11-16T00:00:00.000Z
Link: CVE-2018-0039
No data.
Status : Modified
Published: 2018-07-11T18:29:00.823
Modified: 2024-11-21T03:37:24.573
Link: CVE-2018-0039
No data.
OpenCVE Enrichment
No data.
EUVD