cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-22189,https://securityvulnerability.io/vulnerability/CVE-2022-22189,Contrail Service Orchestration: An authenticated local user may have their permissions elevated via the device via management interface without authentication,An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0.,Juniper Networks,Contrail Service Orchestration,7.3,HIGH,0.0004400000034365803,false,,false,false,true,2024-08-03T04:16:16.000Z,,false,false,,2022-04-13T00:00:00.000Z,0 CVE-2022-22152,https://securityvulnerability.io/vulnerability/CVE-2022-22152,Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface,"A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.",Juniper Networks,Contrail Service Orchestration,7.7,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2022-01-19T01:15:00.000Z,0 CVE-2021-0279,https://securityvulnerability.io/vulnerability/CVE-2021-0279,Contrail Cloud: Hardcoded credentials for RabbitMQ service,"Juniper Networks Contrail Cloud (CC) releases prior to 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials. The messaging services of RabbitMQ are used when coordinating operations and status information among Contrail services. An attacker with access to an administrative service for RabbitMQ (e.g. GUI), can use these hardcoded credentials to cause a Denial of Service (DoS) or have access to unspecified sensitive system information. This issue affects the Juniper Networks Contrail Cloud releases on versions prior to 13.6.0.",Juniper Networks,Contrail Cloud,8.6,HIGH,0.0008099999977275729,false,,false,false,false,,,false,false,,2021-07-15T20:15:00.000Z,0 CVE-2021-0265,https://securityvulnerability.io/vulnerability/CVE-2021-0265,Contrail Insights: The REST API implementation allows an unauthenticated remote attacker to execute commands as root.,"An unvalidated REST API in the AppFormix Agent of Juniper Networks AppFormix allows an unauthenticated remote attacker to execute commands as root on the host running the AppFormix Agent, when certain preconditions are performed by the attacker, thus granting the attacker full control over the environment. This issue affects: Juniper Networks AppFormix 3 versions prior to 3.1.22, 3.2.14, 3.3.0.",Juniper Networks,Contrail Insights,8.1,HIGH,0.007329999934881926,false,,false,false,true,2024-08-03T16:15:23.000Z,,false,false,,2021-04-22T20:15:00.000Z,0 CVE-2021-0212,https://securityvulnerability.io/vulnerability/CVE-2021-0212,Contrail Networking: Administrator credentials are exposed in a plaintext file,An Information Exposure vulnerability in Juniper Networks Contrail Networking allows a locally authenticated attacker able to read files to retrieve administrator credentials stored in plaintext thereby elevating their privileges over the system. This issue affects: Juniper Networks Contrail Networking versions prior to 1911.31.,Juniper Networks,Contrail Networking,5,MEDIUM,0.0004400000034365803,false,,false,false,true,2024-08-03T16:15:20.000Z,,false,false,,2021-01-15T18:15:00.000Z,0 CVE-2018-0040,https://securityvulnerability.io/vulnerability/CVE-2018-0040,Contrail Service Orchestration: hardcoded cryptographic certificates and keys,"Juniper Networks Contrail Service Orchestrator versions prior to 4.0.0 use hardcoded cryptographic certificates and keys in some cases, which may allow network based attackers to gain unauthorized access to services.",Juniper Networks,Contrail Service Orchestration,9.8,CRITICAL,0.001500000013038516,false,,false,false,true,2024-08-05T04:15:09.000Z,,false,false,,2018-07-11T00:00:00.000Z,0 CVE-2018-0041,https://securityvulnerability.io/vulnerability/CVE-2018-0041,Contrail Service Orchestration: Hardcoded credentials for Keystone service.,Juniper Networks Contrail Service Orchestration releases prior to 3.3.0 use hardcoded credentials to access Keystone service. These credentials allow network based attackers unauthorized access to information stored in keystone.,Juniper Networks,Contrail Service Orchestration,9.8,CRITICAL,0.002219999907538295,false,,false,false,true,2024-08-05T04:15:09.000Z,,false,false,,2018-07-11T00:00:00.000Z,0 CVE-2018-0039,https://securityvulnerability.io/vulnerability/CVE-2018-0039,Contrail Service Orchestration: Hardcoded credentials for Grafana service,Juniper Networks Contrail Service Orchestration releases prior to 4.0.0 have Grafana service enabled by default with hardcoded credentials. These credentials allow network based attackers unauthorized access to information stored in Grafana or exploit other weaknesses or vulnerabilities in Grafana.,Juniper Networks,Contrail Service Orchestration,6.5,MEDIUM,0.002219999907538295,false,,false,false,true,2024-08-05T04:15:09.000Z,,false,false,,2018-07-11T00:00:00.000Z,0 CVE-2017-10617,https://securityvulnerability.io/vulnerability/CVE-2017-10617,Contrail: XML External Entity (XXE) vulnerability,The ifmap service that comes bundled with Contrail has an XML External Entity (XXE) vulnerability that may allow an attacker to retrieve sensitive system files. Affected releases are Juniper Networks Contrail 2.2 prior to 2.21.4; 3.0 prior to 3.0.3.4; 3.1 prior to 3.1.4.0; 3.2 prior to 3.2.5.0. CVE-2017-10616 and CVE-2017-10617 can be chained together and have a combined CVSSv3 score of 5.8 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).,Juniper Networks,Contrail,5,MEDIUM,0.0015300000086426735,false,,false,false,true,2017-10-11T07:38:18.000Z,true,false,false,,2017-10-13T00:00:00.000Z,0 CVE-2017-10616,https://securityvulnerability.io/vulnerability/CVE-2017-10616,Contrail: hard coded credentials,The ifmap service that comes bundled with Juniper Networks Contrail releases uses hard coded credentials. Affected releases are Contrail releases 2.2 prior to 2.21.4; 3.0 prior to 3.0.3.4; 3.1 prior to 3.1.4.0; 3.2 prior to 3.2.5.0. CVE-2017-10616 and CVE-2017-10617 can be chained together and have a combined CVSSv3 score of 5.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N).,Juniper Networks,Contrail,5.3,MEDIUM,0.0017099999822676182,false,,false,false,true,2024-08-05T18:15:56.000Z,,false,false,,2017-10-13T00:00:00.000Z,0