Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 use hardcoded credentials to access Keystone service. These credentials allow network based attackers unauthorized access to information stored in keystone.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0865 | Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 use hardcoded credentials to access Keystone service. These credentials allow network based attackers unauthorized access to information stored in keystone. |
Fixes
Solution
This issue is fixed in Contrail Service Orchestration 3.3.0 and subsequent releases.
Workaround
Limit access to the CSO environment to only trusted networks and hosts.
References
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA10872 |
|
History
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T23:25:36.406Z
Reserved: 2017-11-16T00:00:00.000Z
Link: CVE-2018-0041
No data.
Status : Modified
Published: 2018-07-11T18:29:00.950
Modified: 2024-11-21T03:37:24.793
Link: CVE-2018-0041
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD