{ "id": "CVE-2021-0279", "sourceIdentifier": "sirt@juniper.net", "published": "2021-07-15T20:15:09.543", "lastModified": "2024-11-21T05:42:23.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Juniper Networks Contrail Cloud (CC) releases prior to 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials. The messaging services of RabbitMQ are used when coordinating operations and status information among Contrail services. An attacker with access to an administrative service for RabbitMQ (e.g. GUI), can use these hardcoded credentials to cause a Denial of Service (DoS) or have access to unspecified sensitive system information. This issue affects the Juniper Networks Contrail Cloud releases on versions prior to 13.6.0." }, { "lang": "es", "value": "Juniper Networks Contrail Cloud (CC) versiones anteriores a 13.6.0, presenta el servicio RabbitMQ activado por defecto con credenciales embebidas. Los servicios de mensajer\u00eda de RabbitMQ son usados cuando se coordinan las operaciones y la informaci\u00f3n de estado entre los servicios de Contrail. Un atacante con acceso a un servicio administrativo para RabbitMQ (por ejemplo, GUI), puede usar estas credenciales embebidas para causar una Denegaci\u00f3n de Servicio (DoS) o tener acceso a informaci\u00f3n confidencial del sistema no especificada. Este problema afecta a las versiones de Juniper Networks Contrail Cloud anteriores a 13.6.0" } ], "metrics": { "cvssMetricV31": [ { "source": "sirt@juniper.net", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "baseScore": 8.6, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 4.7 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.2, "impactScore": 4.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "baseScore": 5.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "sirt@juniper.net", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-798" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-798" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:juniper:contrail_cloud:*:*:*:*:*:*:*:*", "versionEndExcluding": "13.6", "matchCriteriaId": "810B43DB-52EB-4B8E-B5E4-997AF96A1412" } ] } ] } ], "references": [ { "url": "https://kb.juniper.net/JSA11183", "source": "sirt@juniper.net", "tags": [ "Vendor Advisory" ] }, { "url": "https://kb.juniper.net/JSA11183", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }