Vulnerability Name:

CVE-2019-0030 (CCN-155363)

Assigned:2018-10-11
Published:2019-01-09
Updated:2021-11-23
Summary:Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
CVSS v3 Severity:7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
6.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-916
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-0030

Source: XF
Type: UNKNOWN
juniper-atp-cve20190030-default-acct(155363)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10918
2019-01 Security Bulletin: Juniper ATP: Multiple vulnerabilities resolved in 5.0.3 and 5.0.4

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA10918

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:advanced_threat_prevention_firmware:*:*:*:*:*:*:*:* (Version >= 5.0.0 and < 5.0.3)
  • AND
  • cpe:/h:juniper:atp400:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:atp700:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper advanced threat prevention firmware *
    juniper atp400 -
    juniper atp700 -