Description
Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
Published: 2019-01-15
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.


Vendor Workaround

There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0829 Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
References
History

No history.

Subscriptions

Juniper Advanced Threat Prevention Atp400 Atp700
cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T21:03:47.862Z

Reserved: 2018-10-11T00:00:00.000Z

Link: CVE-2019-0022

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-15T21:29:01.683

Modified: 2024-11-21T04:16:04.193

Link: CVE-2019-0022

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses