The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2839 The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a copy of credentials managed by Junos Space. The impact of a successful attack includes, but is not limited to, obtaining access to other servers connected to the Junos Space Management Platform. This issue affects Juniper Networks Junos Space versions prior to 20.3R1.
Fixes

Solution

The following software releases have been updated to resolve these specific issues: Junos Space 20.3R1, and all subsequent releases.


Workaround

There are no viable workarounds for this issue. To reduce the risk of exploitation of these issues, use access lists or firewall filters to limit access to Junos Space to only trusted administrative networks, hosts and users.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-16T22:20:15.866Z

Reserved: 2020-10-27T00:00:00

Link: CVE-2021-0220

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-01-15T18:15:15.667

Modified: 2024-11-21T05:42:14.073

Link: CVE-2021-0220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.