Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-22152 (GCVE-0-2022-22152)
Vulnerability from cvelistv5
- CWE-693 - Protection Mechanism Failure
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Contrail Service Orchestration |
Version: unspecified < 6.1.0 Patch 3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:48.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA11260" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Contrail Service Orchestration", "vendor": "Juniper Networks", "versions": [ { "lessThan": "6.1.0 Patch 3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-19T00:20:53", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA11260" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve these specific issues: Juniper Networks Contrail Service Orchestration (CSO) 6.1.0 Patch 3, 6.2.0, and all subsequent releases." } ], "source": { "advisory": "JSA11260", "defect": [ "CXU-58865" ], "discovery": "USER" }, "title": "Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-22152", "STATE": "PUBLIC", "TITLE": "Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Contrail Service Orchestration", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.1.0 Patch 3" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693 Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA11260", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA11260" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve these specific issues: Juniper Networks Contrail Service Orchestration (CSO) 6.1.0 Patch 3, 6.2.0, and all subsequent releases." } ], "source": { "advisory": "JSA11260", "defect": [ "CXU-58865" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2022-22152", "datePublished": "2022-01-19T00:20:53.128791Z", "dateReserved": "2021-12-21T00:00:00", "dateUpdated": "2024-09-17T02:26:36.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-22152\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2022-01-19T01:15:08.133\",\"lastModified\":\"2024-11-21T06:46:15.810\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Fallo del Mecanismo de Protecci\u00f3n en la API REST de Juniper Networks Contrail Service Orchestration permite a un arrendatario del sistema visualizar detalles de configuraci\u00f3n confidenciales de otro arrendatario del mismo sistema. Al usar la API REST, un inquilino puede obtener informaci\u00f3n sobre la configuraci\u00f3n del firewall y las pol\u00edticas de control de acceso de otro inquilino, as\u00ed como otra informaci\u00f3n confidencial, exponiendo al inquilino a una defensa reducida contra ataques maliciosos o a la explotaci\u00f3n por medio de vulnerabilidades adicionales no determinadas. Este problema afecta a versiones de Juniper Networks Contrail Service Orchestration anteriores a 6.1.0 Patch 3\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:contrail_service_orchestration:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.0.0\",\"matchCriteriaId\":\"1F69DEF1-CFB2-4FDD-9729-965DAA400F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DD57602-86B0-4FAD-837A-1B47835E15CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"23D03743-51A8-4D38-BFAF-A5348F5F8C81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A465C5-9FFA-4FDE-BD98-B95611F4ED1F\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA11260\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA11260\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
fkie_cve-2022-22152
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
URL | Tags | ||
---|---|---|---|
sirt@juniper.net | https://kb.juniper.net/JSA11260 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA11260 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
juniper | contrail_service_orchestration | * | |
juniper | contrail_service_orchestration | 6.1.0 | |
juniper | contrail_service_orchestration | 6.1.0 | |
juniper | contrail_service_orchestration | 6.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F69DEF1-CFB2-4FDD-9729-965DAA400F9F", "versionEndIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "9DD57602-86B0-4FAD-837A-1B47835E15CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "23D03743-51A8-4D38-BFAF-A5348F5F8C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch2:*:*:*:*:*:*", "matchCriteriaId": "90A465C5-9FFA-4FDE-BD98-B95611F4ED1F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3." }, { "lang": "es", "value": "Una vulnerabilidad de Fallo del Mecanismo de Protecci\u00f3n en la API REST de Juniper Networks Contrail Service Orchestration permite a un arrendatario del sistema visualizar detalles de configuraci\u00f3n confidenciales de otro arrendatario del mismo sistema. Al usar la API REST, un inquilino puede obtener informaci\u00f3n sobre la configuraci\u00f3n del firewall y las pol\u00edticas de control de acceso de otro inquilino, as\u00ed como otra informaci\u00f3n confidencial, exponiendo al inquilino a una defensa reducida contra ataques maliciosos o a la explotaci\u00f3n por medio de vulnerabilidades adicionales no determinadas. Este problema afecta a versiones de Juniper Networks Contrail Service Orchestration anteriores a 6.1.0 Patch 3" } ], "id": "CVE-2022-22152", "lastModified": "2024-11-21T06:46:15.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "sirt@juniper.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-19T01:15:08.133", "references": [ { "source": "sirt@juniper.net", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/JSA11260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/JSA11260" } ], "sourceIdentifier": "sirt@juniper.net", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "sirt@juniper.net", "type": "Primary" } ] }
gsd-2022-22152
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-22152", "description": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities.\n\nThis issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.", "id": "GSD-2022-22152" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-22152" ], "details": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.", "id": "GSD-2022-22152", "modified": "2023-12-13T01:19:30.171110Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-22152", "STATE": "PUBLIC", "TITLE": "Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Contrail Service Orchestration", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.1.0 Patch 3" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693 Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA11260", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA11260" } ] }, "solution": [ { "lang": "eng", "value": "The following software releases have been updated to resolve these specific issues: Juniper Networks Contrail Service Orchestration (CSO) 6.1.0 Patch 3, 6.2.0, and all subsequent releases." } ], "source": { "advisory": "JSA11260", "defect": [ "CXU-58865" ], "discovery": "USER" }, "work_around": [ { "lang": "eng", "value": "There are no known workarounds for this issue." } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:juniper:contrail_service_orchestration:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:contrail_service_orchestration:6.1.0:patch2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "ID": "CVE-2022-22152" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-693" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA11260", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://kb.juniper.net/JSA11260" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-01-24T21:20Z", "publishedDate": "2022-01-19T01:15Z" } } }
var-202201-0633
Vulnerability from variot
A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3. Used to connect many enterprise and multi-tenant service provider solutions. A remote attacker can view confidential configuration details of other tenants on the same system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0633", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "contrail service orchestration", "scope": "lte", "trust": 1.0, "vendor": "juniper", "version": "6.0.0" }, { "model": "contrail service orchestration", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "6.1.0" }, { "model": "contrail service orchestration", "scope": "eq", "trust": 0.8, "vendor": "\u30b8\u30e5\u30cb\u30d1\u30fc\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9", "version": null }, { "model": "contrail service orchestration", "scope": "eq", "trust": 0.8, "vendor": "\u30b8\u30e5\u30cb\u30d1\u30fc\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9", "version": "6.1.0 patch 3" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "NVD", "id": "CVE-2022-22152" } ] }, "cve": "CVE-2022-22152", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2022-22152", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-409681", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-22152", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "sirt@juniper.net", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.1, "id": "CVE-2022-22152", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22152", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22152", "trust": 1.0, "value": "MEDIUM" }, { "author": "sirt@juniper.net", "id": "CVE-2022-22152", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22152", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202201-1386", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-409681", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22152", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409681" }, { "db": "VULMON", "id": "CVE-2022-22152" }, { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "CNNVD", "id": "CNNVD-202201-1386" }, { "db": "NVD", "id": "CVE-2022-22152" }, { "db": "NVD", "id": "CVE-2022-22152" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3. Used to connect many enterprise and multi-tenant service provider solutions. A remote attacker can view confidential configuration details of other tenants on the same system", "sources": [ { "db": "NVD", "id": "CVE-2022-22152" }, { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "VULHUB", "id": "VHN-409681" }, { "db": "VULMON", "id": "CVE-2022-22152" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22152", "trust": 3.4 }, { "db": "JUNIPER", "id": "JSA11260", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2022-003373", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-1386", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022011708", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-06891", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409681", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22152", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409681" }, { "db": "VULMON", "id": "CVE-2022-22152" }, { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "CNNVD", "id": "CNNVD-202201-1386" }, { "db": "NVD", "id": "CVE-2022-22152" } ] }, "id": "VAR-202201-0633", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409681" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:44:06.473000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA11260", "trust": 0.8, "url": "https://supportportal.juniper.net/s/article/2022-01-Security-Bulletin-Contrail-Service-Orchestration-Tenants-able-to-see-other-tenants-policies-via-REST-API-interface-CVE-2022-22152?language=en_US" }, { "title": "Juniper Networks Contrail Service Orchestration Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=179693" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22152" }, { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "CNNVD", "id": "CNNVD-202201-1386" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-693", "trust": 1.1 }, { "problemtype": "Malfunction of protection mechanism (CWE-693) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409681" }, { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "NVD", "id": "CVE-2022-22152" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://kb.juniper.net/jsa11260" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22152" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022011708" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/693.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409681" }, { "db": "VULMON", "id": "CVE-2022-22152" }, { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "CNNVD", "id": "CNNVD-202201-1386" }, { "db": "NVD", "id": "CVE-2022-22152" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409681" }, { "db": "VULMON", "id": "CVE-2022-22152" }, { "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "db": "CNNVD", "id": "CNNVD-202201-1386" }, { "db": "NVD", "id": "CVE-2022-22152" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "VULHUB", "id": "VHN-409681" }, { "date": "2022-01-19T00:00:00", "db": "VULMON", "id": "CVE-2022-22152" }, { "date": "2023-02-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1386" }, { "date": "2022-01-19T01:15:08.133000", "db": "NVD", "id": "CVE-2022-22152" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-24T00:00:00", "db": "VULHUB", "id": "VHN-409681" }, { "date": "2022-01-24T00:00:00", "db": "VULMON", "id": "CVE-2022-22152" }, { "date": "2023-02-16T00:46:00", "db": "JVNDB", "id": "JVNDB-2022-003373" }, { "date": "2022-01-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1386" }, { "date": "2024-11-21T06:46:15.810000", "db": "NVD", "id": "CVE-2022-22152" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1386" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper\u00a0Networks\u00a0Contrail\u00a0Service\u00a0Orchestration\u00a0 Vulnerability regarding a defect in the protection mechanism in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003373" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1386" } ], "trust": 0.6 } }
ghsa-hv5p-2fm6-37xc
Vulnerability from github
A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.
{ "affected": [], "aliases": [ "CVE-2022-22152" ], "database_specific": { "cwe_ids": [ "CWE-693" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-19T01:15:00Z", "severity": "MODERATE" }, "details": "A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant\u0027s firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.", "id": "GHSA-hv5p-2fm6-37xc", "modified": "2022-01-25T00:02:11Z", "published": "2022-01-20T00:02:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22152" }, { "type": "WEB", "url": "https://kb.juniper.net/JSA11260" } ], "schema_version": "1.4.0", "severity": [] }
CERTFR-2022-AVI-040
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | Juniper Networks Contrail Service Orchestration versions antérieures à 6.1.0 Patch 3 | ||
Juniper Networks | N/A | Junos sur MX versions 21.2 antérieures à 21.2R2 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.4 antérieures à 20.4R2-S2 ou 20.4R3 | ||
Juniper Networks | N/A | Junos sur MX SPC3 et SRX versions 18.3 antérieures à 18.3R3 | ||
Juniper Networks | N/A | Junos sur MX versions 20.4 antérieures à 20.4R3 | ||
Juniper Networks | N/A | Junos versions 19.4 antérieures à 19.4R3-S6 | ||
Juniper Networks | N/A | Junos sur MX SPC3 et SRX versions 19.2 antérieures à 19.2R1-S1 ou 19.2R2 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S2 | ||
Juniper Networks | N/A | Junos versions 18.2 depuis 18.2R3-S6 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.1 antérieures à 20.1R3-S1 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.4 antérieures à 19.4R1-S3 ou 19.4R2-S2 ou 19.4R3 | ||
Juniper Networks | N/A | Junos Evolved versions 21.2 antérieures à 21.2R2-EVO | ||
Juniper Networks | N/A | Junos versions 17.3 depuis 17.3R3-S9 antérieures à 17.3R3-S12 | ||
Juniper Networks | N/A | Junos sur SRX versions 18.4 antérieures à 18.4R2-S10 ou 18.4R3-S10 | ||
Juniper Networks | N/A | Junos sur MX versions 19.4 antérieures à 19.4R3-S5 | ||
Juniper Networks | N/A | Junos versions 20.4 antérieures à 20.4R3-S1 | ||
Juniper Networks | N/A | Junos versions 18.1 depuis 18.1R3-S11 antérieures à 18.1R3-S13 | ||
Juniper Networks | N/A | Junos sur MX versions 20.2 antérieures à 20.2R3-S3 | ||
N/A | N/A | Junos sur MX SPC3 et SRX versions antérieures à 18.2R3 | ||
Juniper Networks | N/A | Junos versions 18.3 depuis 18.3R3-S4 antérieures à 18.3R3-S5 | ||
Juniper Networks | N/A | Junos versions 19.4 antérieures à 19.4R2-S5 ou 19.4R3-S5 | ||
N/A | N/A | Junos sur MX SPC3 et SRX versions 19.1 antérieures à 19.1R2 | ||
Juniper Networks | N/A | Junos versions 16.1R1 antérieures à 18.4R3-S10 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R1-S7 ou 19.2R3-S3 | ||
Juniper Networks | N/A | Junos versions 20.4 antérieures à 20.4R2 | ||
Juniper Networks | N/A | Junos versions 20.4 antérieures à 20.4R2-S2 ou 20.4R3 | ||
N/A | N/A | Junos sur MX versions 20.3 antérieures à 20.3R3-S2 | ||
Juniper Networks | N/A | Junos versions 20.1 antérieures à 20.1R2-S2 ou 20.1R3 | ||
Juniper Networks | N/A | Junos versions 20.2 antérieures à 20.2R3-S3 | ||
Juniper Networks | N/A | Junos sur SRX versions 21.1 antérieures à 21.1R2-S2 ou 21.1R3 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur MX versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos versions 19.4 antérieures à 19.4R3-S7 | ||
Juniper Networks | N/A | Junos Evolved versions antérieures à 20.4R2-S2-EVO | ||
Juniper Networks | N/A | Junos sur MX versions 19.1 antérieures à 19.1R2-S3 ou 19.1R3-S7 | ||
Juniper Networks | N/A | Junos sur MX SPC3 et SRX versions 18.4 antérieures à 18.4R2-S9 ou 18.4R3 | ||
N/A | N/A | Junos versions 19.3 antérieures à 19.3R3-S4 | ||
Juniper Networks | N/A | Junos versions 19.1 depuis 19.1R3-S3 antérieures à 19.1R3-S7 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 21.1 antérieures à 21.1R2-S1 ou 21.1R3 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R2-S2 ou 21.1R3 | ||
Juniper Networks | N/A | Junos sur SRX versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos versions 19.3 antérieures à 19.3R2-S7 ou 19.3R3-S4 | ||
Juniper Networks | N/A | Junos version 20.4 antérieures à 20.4R3 | ||
Juniper Networks | N/A | Junos sur MX versions 19.3 antérieures à 19.3R3-S4 | ||
Juniper Networks | N/A | Junos versions 18.4 depuis 18.4R3-S5 antérieures à 18.4R3-S9 | ||
Juniper Networks | N/A | Junos sur SRX versions 19.3 antérieures à 19.3R3-S3 | ||
Juniper Networks | N/A | Junos versions 20.1 antérieures à 20.1R3-S1 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos sur SRX versions 19.1 antérieures à 19.1R3-S8 | ||
Juniper Networks | N/A | Junos version 18.4 antérieures à 18.4R3-S9 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 19.3 antérieures à 19.3R3-S5 | ||
N/A | N/A | Junos sur SRX versions 19.4 antérieures à 19.4R3-S5 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R2-S1 ou 21.1R3 | ||
Juniper Networks | N/A | Junos versions 18.4 antérieures à 18.4R2-S9 ou 18.4R3-S9 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R2 | ||
Juniper Networks | N/A | Junos version 19.2 antérieures à 19.2R1-S8 ou 19.2R3-S3 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.1 antérieures à 19.1R3-S5 | ||
Juniper Networks | N/A | Junos versions antérieures à 18.3R3-S6 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R1-S7 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos version 19.4 antérieures à 19.4R3-S5 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions antérieures à 19.2R1-S8 ou 19.2R3-S4 | ||
Juniper Networks | N/A | Junos sur SRX versions 20.2 antérieures à 20.2R3-S2 | ||
Juniper Networks | N/A | Junos versions 19.2 antérieures à 19.2R3-S4 | ||
Juniper Networks | N/A | Junos sur SRX versions 21.2 antérieures à 21.2R2 | ||
Juniper Networks | N/A | Junos version 20.2 antérieures à 20.2R3-S2 | ||
Juniper Networks | N/A | Junos Evolved versions 21.1 depuis 21.1R1-EVO | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.4 antérieures à 20.4R3 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.1 antérieures à 20.1R3-S2 | ||
Juniper Networks | N/A | Junos versions 18.4 antérieures à 18.4R2-S9 ou 18.4R3-S10 | ||
Juniper Networks | N/A | Junos version 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 19.4 antérieures à 19.4R2-S5 ou 19.4R3-S6 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R1-S1 ou 21.1R2 | ||
Juniper Networks | N/A | Junos versions 19.1 antérieures à 19.1R3-S7 | ||
Juniper Networks | N/A | Junos version 21.1 antérieures à 21.1R2 | ||
Juniper Networks | N/A | Junos versions 21.1 antérieures à 21.1R3 | ||
Juniper Networks | N/A | Junos versions 20.2 antérieures à 20.2R3 | ||
Juniper Networks | N/A | Junos version 21.2 antérieures à 21.2R2 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 18.4 antérieures à 18.4R3-S10 | ||
Juniper Networks | N/A | Junos version 20.1 antérieures à 20.1R3-S1 | ||
Juniper Networks | N/A | Junos versions 19.1 antérieures à 19.1R2-S3 ou 19.1R3-S7 | ||
N/A | N/A | Junos sur vMX et MX150 versions 21.2 antérieures à 21.2R1-S1 ou 21.2R2 | ||
Juniper Networks | N/A | Junos versions 15.1 antérieures à 15.1R7-S11 | ||
Juniper Networks | N/A | Junos versions 17.4 depuis 17.4R3-S3 antérieures à 17.4R3-S5 | ||
Juniper Networks | N/A | Junos versions antérieures à 15.1R7-S11 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 19.3 antérieures à 19.3R2-S6 ou 19.3R3-S2 | ||
Juniper Networks | N/A | Junos versions 20.1 antérieures à 20.1R3-S2 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 21.3 antérieures à 21.3R1-S1 ou 21.3R2 | ||
Juniper Networks | N/A | Junos sur MX versions 16.1 depuis 16.1R1 antérieures à 18.4R3-S10 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 20.1 antérieures à 20.1R2 | ||
Juniper Networks | N/A | Junos versions antérieures à 18.4R2-S9 ou 18.4R3-S9 | ||
Juniper Networks | N/A | Junos version 19.1 antérieures à 19.1R2-S3 ou 19.1R3-S7 | ||
Juniper Networks | N/A | Junos sur MX versions 20.1 antérieures à 20.1R3-S3 | ||
Juniper Networks | N/A | Junos sur vMX et MX150 versions 20.2 antérieures à 20.2R3-S3 | ||
Juniper Networks | N/A | Junos versions 21.2 antérieures à 21.2R1-S1 ou 21.2R2 | ||
Juniper Networks | N/A | Junos versions 20.3 antérieures à 20.3R3-S1 | ||
Juniper Networks | N/A | Junos sur MX versions 21.1 antérieures à 21.1R3 | ||
Juniper Networks | N/A | Junos versions 20.3 antérieures à 20.3R2-S1 ou 20.3R3 | ||
Juniper Networks | N/A | Junos versions 20.2 antérieures à 20.2R3-S2 | ||
Juniper Networks | N/A | Junos sur ACX5448 versions 20.2 antérieures à 20.2R1-S1 ou 20.2R2 | ||
Juniper Networks | N/A | Junos versions 18.3 antérieures à 18.3R3-S6 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Juniper Networks Contrail Service Orchestration versions ant\u00e9rieures \u00e0 6.1.0 Patch 3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 21.2 ant\u00e9rieures \u00e0 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.4 ant\u00e9rieures \u00e0 20.4R2-S2 ou 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 18.3 ant\u00e9rieures \u00e0 18.3R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.4 ant\u00e9rieures \u00e0 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S1 ou 19.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.2 depuis 18.2R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.4 ant\u00e9rieures \u00e0 19.4R1-S3 ou 19.4R2-S2 ou 19.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Evolved versions 21.2 ant\u00e9rieures \u00e0 21.2R2-EVO", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 17.3 depuis 17.3R3-S9 ant\u00e9rieures \u00e0 17.3R3-S12", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S10 ou 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.1 depuis 18.1R3-S11 ant\u00e9rieures \u00e0 18.1R3-S13", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions ant\u00e9rieures \u00e0 18.2R3", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 18.3 depuis 18.3R3-S4 ant\u00e9rieures \u00e0 18.3R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.4 ant\u00e9rieures \u00e0 19.4R2-S5 ou 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 19.1 ant\u00e9rieures \u00e0 19.1R2", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 16.1R1 ant\u00e9rieures \u00e0 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S7 ou 19.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.4 ant\u00e9rieures \u00e0 20.4R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.4 ant\u00e9rieures \u00e0 20.4R2-S2 ou 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S2", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 20.1 ant\u00e9rieures \u00e0 20.1R2-S2 ou 20.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S2 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Evolved versions ant\u00e9rieures \u00e0 20.4R2-S2-EVO", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.1 ant\u00e9rieures \u00e0 19.1R2-S3 ou 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX SPC3 et SRX versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S4", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 19.1 depuis 19.1R3-S3 ant\u00e9rieures \u00e0 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S1 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S2 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.3 ant\u00e9rieures \u00e0 19.3R2-S7 ou 19.3R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.4 ant\u00e9rieures \u00e0 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.4 depuis 18.4R3-S5 ant\u00e9rieures \u00e0 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S8", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 18.4 ant\u00e9rieures \u00e0 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R2-S1 ou 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 19.2 ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions ant\u00e9rieures \u00e0 18.3R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S7 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 19.4 ant\u00e9rieures \u00e0 19.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions ant\u00e9rieures \u00e0 19.2R1-S8 ou 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.2 ant\u00e9rieures \u00e0 19.2R3-S4", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur SRX versions 21.2 ant\u00e9rieures \u00e0 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.2 ant\u00e9rieures \u00e0 20.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Evolved versions 21.1 depuis 21.1R1-EVO", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.4 ant\u00e9rieures \u00e0 20.4R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.4 ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 19.4 ant\u00e9rieures \u00e0 19.4R2-S5 ou 19.4R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R1-S1 ou 21.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 21.1 ant\u00e9rieures \u00e0 21.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.1 ant\u00e9rieures \u00e0 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.2 ant\u00e9rieures \u00e0 20.2R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 21.2 ant\u00e9rieures \u00e0 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 18.4 ant\u00e9rieures \u00e0 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 20.1 ant\u00e9rieures \u00e0 20.1R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 19.1 ant\u00e9rieures \u00e0 19.1R2-S3 ou 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 21.2 ant\u00e9rieures \u00e0 21.2R1-S1 ou 21.2R2", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos versions 15.1 ant\u00e9rieures \u00e0 15.1R7-S11", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 17.4 depuis 17.4R3-S3 ant\u00e9rieures \u00e0 17.4R3-S5", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions ant\u00e9rieures \u00e0 15.1R7-S11", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 19.3 ant\u00e9rieures \u00e0 19.3R2-S6 ou 19.3R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 21.3 ant\u00e9rieures \u00e0 21.3R1-S1 ou 21.3R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 16.1 depuis 16.1R1 ant\u00e9rieures \u00e0 18.4R3-S10", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 20.1 ant\u00e9rieures \u00e0 20.1R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions ant\u00e9rieures \u00e0 18.4R2-S9 ou 18.4R3-S9", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos version 19.1 ant\u00e9rieures \u00e0 19.1R2-S3 ou 19.1R3-S7", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur vMX et MX150 versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 21.2 ant\u00e9rieures \u00e0 21.2R1-S1 ou 21.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.3 ant\u00e9rieures \u00e0 20.3R3-S1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur MX versions 21.1 ant\u00e9rieures \u00e0 21.1R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.3 ant\u00e9rieures \u00e0 20.3R2-S1 ou 20.3R3", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos sur ACX5448 versions 20.2 ant\u00e9rieures \u00e0 20.2R1-S1 ou 20.2R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos versions 18.3 ant\u00e9rieures \u00e0 18.3R3-S6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-22155", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22155" }, { "name": "CVE-2022-22163", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22163" }, { "name": "CVE-2022-22160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22160" }, { "name": "CVE-2022-22154", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22154" }, { "name": "CVE-2022-22162", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22162" }, { "name": "CVE-2022-22153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22153" }, { "name": "CVE-2022-22152", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22152" }, { "name": "CVE-2022-22161", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22161" }, { "name": "CVE-2022-22168", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22168" }, { "name": "CVE-2022-22164", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22164" }, { "name": "CVE-2022-22169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22169" }, { "name": "CVE-2022-22167", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22167" }, { "name": "CVE-2022-22157", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22157" }, { "name": "CVE-2022-22166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22166" }, { "name": "CVE-2022-22156", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22156" }, { "name": "CVE-2022-22159", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22159" } ], "initial_release_date": "2022-01-13T00:00:00", "last_revision_date": "2022-01-13T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-040", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11271 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11271\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11265 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11265\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11270 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11270\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11262 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11262\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11275 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11275\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11274 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11274\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11263 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11263\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11276 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11276\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11260 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11260\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11269 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11269\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11261 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11261\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11272 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11272\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11264 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11264\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11268 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11268\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11267 du 13 janvier 2022", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11267\u0026cat=SIRT_1\u0026actp=LIST" } ] }
cnvd-2022-06891
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: http://kb.juniper.net
Name | Juniper Networks Contrail Service Orchestration (CSO) <=6.0.0 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-22152" } }, "description": "Juniper Networks Contrail Service Orchestration\u662f\u7f8e\u56fdJuniper Networks\u516c\u53f8\u7684\u4e00\u4e2a\u5f3a\u5927\u7684\u8f6f\u4ef6\u5e73\u53f0\u3002\u7528\u4e8e\u8fde\u63a5\u8bb8\u591a\u4f01\u4e1a\u548c\u591a\u79df\u6237\u670d\u52a1\u63d0\u4f9b\u5546\u89e3\u51b3\u65b9\u6848\u3002\n\nJuniper Networks Contrail Service Orchestration\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4ea7\u54c1\u7684REST API\u4e2d\u4e0d\u9002\u5f53\u7684\u8bbf\u95ee\u9650\u5236\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8be5\u6f0f\u6d1e\u67e5\u770b\u540c\u4e00\u7cfb\u7edf\u4e2d\u5176\u4ed6\u79df\u6237\u7684\u673a\u5bc6\u914d\u7f6e\u7ec6\u8282\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttp://kb.juniper.net", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-06891", "openTime": "2022-01-26", "patchDescription": "Juniper Networks Contrail Service Orchestration\u662f\u7f8e\u56fdJuniper Networks\u516c\u53f8\u7684\u4e00\u4e2a\u5f3a\u5927\u7684\u8f6f\u4ef6\u5e73\u53f0\u3002\u7528\u4e8e\u8fde\u63a5\u8bb8\u591a\u4f01\u4e1a\u548c\u591a\u79df\u6237\u670d\u52a1\u63d0\u4f9b\u5546\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nJuniper Networks Contrail Service Orchestration\u5b58\u5728\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4ea7\u54c1\u7684REST API\u4e2d\u4e0d\u9002\u5f53\u7684\u8bbf\u95ee\u9650\u5236\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8be5\u6f0f\u6d1e\u67e5\u770b\u540c\u4e00\u7cfb\u7edf\u4e2d\u5176\u4ed6\u79df\u6237\u7684\u673a\u5bc6\u914d\u7f6e\u7ec6\u8282\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Juniper Networks Contrail Service Orchestration\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Juniper Networks Contrail Service Orchestration (CSO) \u003c=6.0.0" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-22152", "serverity": "\u4e2d", "submitTime": "2022-01-19", "title": "Juniper Networks Contrail Service Orchestration\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.