"value":"On Juniper ATP, secret passphrase CLI inputs, such as \"set mcm\", are logged to /var/log/syslog in clear text, allowing authenticated local user to be able to view these secret information. This issue affects Juniper ATP 5.0 versions prior to 5.0.4."
"value":"CWE-532 - Information Exposure Through Log Files"
}
]
}
]
},
"references":{
"reference_data":[
{
"name":"https://kb.juniper.net/JSA10918",
"refsource":"CONFIRM",
"url":"https://kb.juniper.net/JSA10918"
}
]
},
"solution":[
{
"lang":"eng",
"value":"The following software release have been updated to resolve this specific issue: 5.0.4 and all subsequent releases.\nIt is also recommended to purge the affected log files and/or change the passphrase after the upgrade."
}
],
"source":{
"advisory":"JSA10918",
"defect":[
"1365676"
],
"discovery":"INTERNAL"
},
"work_around":[
{
"lang":"eng",
"value":"There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk."