CVE-2022-22189 – Contrail Service Orchestration: An authenticated local user may have their permissions elevated via the device via management interface without authentication
https://notcve.org/view.php?id=CVE-2022-22189
An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0. Una vulnerabilidad de Asignación de Propiedad Incorrecta en Juniper Networks Contrail Service Orchestration (CSO) permite que un usuario autenticado localmente tenga sus permisos elevados sin autenticación, tomando así el control del sistema local en el que está autenticado. Este problema afecta a: Juniper Networks Contrail Service Orchestration versiones 6.0.0 anteriores a 6.0.0 Patch v3 en instalaciones locales. • https://kb.juniper.net/JSA69498 • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-708: Incorrect Ownership Assignment •
CVE-2022-22152 – Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface
https://notcve.org/view.php?id=CVE-2022-22152
A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3. Una vulnerabilidad de Fallo del Mecanismo de Protección en la API REST de Juniper Networks Contrail Service Orchestration permite a un arrendatario del sistema visualizar detalles de configuración confidenciales de otro arrendatario del mismo sistema. Al usar la API REST, un inquilino puede obtener información sobre la configuración del firewall y las políticas de control de acceso de otro inquilino, así como otra información confidencial, exponiendo al inquilino a una defensa reducida contra ataques maliciosos o a la explotación por medio de vulnerabilidades adicionales no determinadas. • https://kb.juniper.net/JSA11260 • CWE-693: Protection Mechanism Failure •
CVE-2018-0042
https://notcve.org/view.php?id=CVE-2018-0042
Juniper Networks CSO versions prior to 4.0.0 may log passwords in log files leading to an information disclosure vulnerability. Juniper Networks CSO en versiones anteriores a la 4.0.0 podría registrar contraseñas en archivos de registro, lo que conduce a una vulnerabilidad de divulgación de información. • https://kb.juniper.net/JSA10872 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2018-0040 – Contrail Service Orchestration: hardcoded cryptographic certificates and keys
https://notcve.org/view.php?id=CVE-2018-0040
Juniper Networks Contrail Service Orchestrator versions prior to 4.0.0 use hardcoded cryptographic certificates and keys in some cases, which may allow network based attackers to gain unauthorized access to services. Las versiones anteriores a la 4.0.0 de Juniper Networks Contrail Service Orchestrator emplean certificados criptográficos embebidos y claves en algunos casos, lo que podría permitir que atacantes en la red obtengan acceso no autorizado a los servicios. • https://kb.juniper.net/JSA10872 • CWE-321: Use of Hard-coded Cryptographic Key CWE-798: Use of Hard-coded Credentials •
CVE-2018-0038
https://notcve.org/view.php?id=CVE-2018-0038
Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 have Cassandra service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Cassandra. Las versiones de Juniper Networks Contrail Service Orchestration anteriores a la 3.3.0 tienen el servicio Cassandra habilitado por defecto con credenciales embebidas. Estas credenciales permiten que atacantes en la red accedan de forma no autorizada a la información almacenada en Cassandra. • https://kb.juniper.net/JSA10872 • CWE-798: Use of Hard-coded Credentials •