Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0863 Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana.
Fixes

Solution

This issue is fixed in Contrail Service Orchestration 4.0.0 and subsequent releases.


Workaround

Limit access to the CSO environment to only trusted networks and hosts. Disable Grafana service as it is not required by CSO.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T18:18:58.831Z

Reserved: 2017-11-16T00:00:00

Link: CVE-2018-0039

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-11T18:29:00.823

Modified: 2024-11-21T03:37:24.573

Link: CVE-2018-0039

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.