CVE Vulnerabilities

CVE-2022-22189

Authentication Bypass Using an Alternate Path or Channel

Published: Apr 14, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

An Incorrect Ownership Assignment vulnerability in Juniper Networks Contrail Service Orchestration (CSO) allows a locally authenticated user to have their permissions elevated without authentication thereby taking control of the local system they are currently authenticated to. This issue affects: Juniper Networks Contrail Service Orchestration 6.0.0 versions prior to 6.0.0 Patch v3 on On-premises installations. This issue does not affect Juniper Networks Contrail Service Orchestration On-premises versions prior to 6.0.0.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

Name Vendor Start Version End Version
Contrail_service_orchestration Juniper 6.0.0 (including) 6.0.0 (including)
Contrail_service_orchestration Juniper 6.0.0-patch1 (including) 6.0.0-patch1 (including)
Contrail_service_orchestration Juniper 6.0.0-patch2 (including) 6.0.0-patch2 (including)

Potential Mitigations

References