CVE-2019-0022
Severity
9.8CRITICAL
EPSS
0.4%
top 38.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 15
Latest updateMay 13
Description
Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 3.9 | Impact: 6.0
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-4c33-jjxv-7pfw: Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installatio↗2022-05-13
CVEList▶
Juniper ATP: Two hard coded credentials sharing the same password give an attacker the ability to take control of any installation of the software.↗2019-01-15
📋Vendor Advisories
2VMware▶
VMware ESXi and Horizon DaaS updates address OpenSLP remote code execution vulnerability (CVE-2019-5544)↗2019-12-05
Juniper▶
CVE-2019-0022: Juniper ATP ships with hard coded credentials in the Cyphort Core instance which gives an attacker the ability to take full control of any installatio↗2019-01-15
💬Community
1Bugzilla▶
CVE-2019-5544 openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution↗2019-11-28