{ "CVE_data_meta" : { "ASSIGNER" : "sirt@juniper.net", "DATE_PUBLIC" : "2019-01-09T17:00:00.000Z", "ID" : "CVE-2019-0021", "STATE" : "PUBLIC", "TITLE" : "Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Juniper ATP", "version" : { "version_data" : [ { "affected" : "<", "version_name" : "5.0", "version_value" : "5.0.4" } ] } } ] }, "vendor_name" : "Juniper Networks" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "On Juniper ATP, secret passphrase CLI inputs, such as \"set mcm\", are logged to /var/log/syslog in clear text, allowing authenticated local user to be able to view these secret information. This issue affects Juniper ATP 5.0 versions prior to 5.0.4." } ] }, "impact" : { "cvss" : { "attackComplexity" : "LOW", "attackVector" : "LOCAL", "availabilityImpact" : "NONE", "baseScore" : 7.1, "baseSeverity" : "HIGH", "confidentialityImpact" : "HIGH", "integrityImpact" : "HIGH", "privilegesRequired" : "LOW", "scope" : "UNCHANGED", "userInteraction" : "NONE", "vectorString" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version" : "3.0" } }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "CWE-532 - Information Exposure Through Log Files" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://kb.juniper.net/JSA10918", "refsource" : "CONFIRM", "url" : "https://kb.juniper.net/JSA10918" } ] }, "solution" : [ { "lang" : "eng", "value" : "The following software release have been updated to resolve this specific issue: 5.0.4 and all subsequent releases.\nIt is also recommended to purge the affected log files and/or change the passphrase after the upgrade." } ], "source" : { "advisory" : "JSA10918", "defect" : [ "1365676" ], "discovery" : "INTERNAL" }, "work_around" : [ { "lang" : "eng", "value" : "There are no known workarounds for this issue, however limit the access to only trusted administrators from trusted administrative networks or hosts would minimize the risk." } ] }