CVE Vulnerabilities

CVE-2022-22152

Protection Mechanism Failure

Published: Jan 19, 2022 | Modified: Jan 24, 2022
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenants firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.

Weakness

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

Affected Software

Name Vendor Start Version End Version
Contrail_service_orchestration Juniper * 6.0.0 (including)
Contrail_service_orchestration Juniper 6.1.0 (including) 6.1.0 (including)
Contrail_service_orchestration Juniper 6.1.0-patch1 (including) 6.1.0-patch1 (including)
Contrail_service_orchestration Juniper 6.1.0-patch2 (including) 6.1.0-patch2 (including)

References