{ "CVE_data_meta" : { "ASSIGNER" : "sirt@juniper.net", "DATE_PUBLIC" : "2019-01-09T17:00:00.000Z", "ID" : "CVE-2019-0030", "STATE" : "PUBLIC", "TITLE" : "Juniper ATP: Password hashing uses DES and a hardcoded salt" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Juniper ATP", "version" : { "version_data" : [ { "affected" : "<", "version_name" : "5.0", "version_value" : "5.0.3" } ] } } ] }, "vendor_name" : "Juniper Networks" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3." } ] }, "exploit" : [ { "lang" : "eng", "value" : "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "impact" : { "cvss" : { "attackComplexity" : "LOW", "attackVector" : "LOCAL", "availabilityImpact" : "HIGH", "baseScore" : 6.7, "baseSeverity" : "MEDIUM", "confidentialityImpact" : "HIGH", "integrityImpact" : "HIGH", "privilegesRequired" : "HIGH", "scope" : "UNCHANGED", "userInteraction" : "NONE", "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version" : "3.0" } }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "CWE-327: Use of a Broken or Risky Cryptographic Algorithm\nCWE-664 - Improper Control of a Resource Through its Lifetime" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://kb.juniper.net/JSA10918", "refsource" : "CONFIRM", "url" : "https://kb.juniper.net/JSA10918" } ] }, "solution" : [ { "lang" : "eng", "value" : "The following software release have been updated to resolve this specific issue: 5.0.3 and all subsequent releases.\nIt is suggested to change any credentials after the upgrade to the fixed version." } ], "source" : { "advisory" : "JSA10918", "defect" : [ "1365976", "1365987" ], "discovery" : "INTERNAL" }, "work_around" : [ { "lang" : "eng", "value" : "There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk." } ] }