Vulnerability Name:

CVE-2022-22152 (CCN-217150)

Assigned:2021-12-21
Published:2022-01-12
Updated:2022-01-24
Summary:A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
7.7 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)
6.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-693
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-22152

Source: XF
Type: UNKNOWN
juniper-cve202222152-info-disc(217150)

Source: CCN
Type: Juniper Networks Security Bulletin JSA11260
Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface (CVE-2022-22152)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA11260

Source: CCN
Type: Mend Vulnerability Database
CVE-2022-2215

Vulnerable Configuration:Configuration 1:
  • cpe:/a:juniper:contrail_service_orchestration:*:*:*:*:*:*:*:* (Version <= 6.0.0)
  • OR cpe:/a:juniper:contrail_service_orchestration:6.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:juniper:contrail_service_orchestration:6.1.0:patch1:*:*:*:*:*:*
  • OR cpe:/a:juniper:contrail_service_orchestration:6.1.0:patch2:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:juniper:contrail_service_orchestration:6.1.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper contrail service orchestration *
    juniper contrail service orchestration 6.1.0 -
    juniper contrail service orchestration 6.1.0 patch1
    juniper contrail service orchestration 6.1.0 patch2
    juniper contrail service orchestration 6.1.0 -