"value":"Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3."
"value":"CWE-327: Use of a Broken or Risky Cryptographic Algorithm\nCWE-664 - Improper Control of a Resource Through its Lifetime"
}
]
}
]
},
"references":{
"reference_data":[
{
"name":"https://kb.juniper.net/JSA10918",
"refsource":"CONFIRM",
"url":"https://kb.juniper.net/JSA10918"
}
]
},
"solution":[
{
"lang":"eng",
"value":"The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.\nIt is suggested to change any credentials after the upgrade to the fixed version."
}
],
"source":{
"advisory":"JSA10918",
"defect":[
"1365976",
"1365987"
],
"discovery":"INTERNAL"
},
"work_around":[
{
"lang":"eng",
"value":"There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk."