Description
Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 use hardcoded credentials to access Keystone service. These credentials allow network based attackers unauthorized access to information stored in keystone.
No analysis available yet.
Remediation
Vendor Solution
This issue is fixed in Contrail Service Orchestration 3.3.0 and subsequent releases.
Vendor Workaround
Limit access to the CSO environment to only trusted networks and hosts.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0865 | Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 use hardcoded credentials to access Keystone service. These credentials allow network based attackers unauthorized access to information stored in keystone. |
References
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA10872 |
|
History
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T23:25:36.406Z
Reserved: 2017-11-16T00:00:00.000Z
Link: CVE-2018-0041
No data.
Status : Modified
Published: 2018-07-11T18:29:00.950
Modified: 2024-11-21T03:37:24.793
Link: CVE-2018-0041
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD