Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0020— Juniper ATP: Hard coded credentials used in Web Collector

EPSS 0.41% · P61
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-0020

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Juniper ATP: Hard coded credentials used in Web Collector
Source: NVD (National Vulnerability Database)
Vulnerability Description
Juniper ATP ships with hard coded credentials in the Web Collector instance which gives an attacker the ability to take full control of any installation of the software. Affected releases are Juniper Networks Juniper ATP: 5.0 versions prior to 5.0.3.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用硬编码的凭证
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper ATP 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Advanced Threat Prevention(ATP)是美国瞻博网络(Juniper Networks)公司的一套高级威胁防护平台。该产品支持恶意软件检测、文件分析、恶意IP地址和URL拦截等功能。 Juniper ATP 5.0.3之前的5.0版本中存在安全漏洞,该漏洞源于Web Collector使用了硬编码凭证。攻击者可利用该漏洞获取系统的访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJuniper ATP 5.0 ~ 5.0.3 -

II. Public POCs for CVE-2019-0020

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-0020

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2019-01-15 · 26 CVEs total

CVE-2019-0015Junos OS: SRX Series: Deleted dynamic VPN users are allowed to establish VPN connections u
CVE-2019-0030Juniper ATP: Password hashing uses DES and a hardcoded salt
CVE-2019-0029Juniper ATP: Splunk credentials are in logged in clear text
CVE-2019-0027Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration
CVE-2019-0026Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration
CVE-2019-0025Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu
CVE-2019-0024Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu
CVE-2019-0023Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu
CVE-2019-0022Juniper ATP: Two hard coded credentials sharing the same password give an attacker the abi
CVE-2019-0021Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text
CVE-2019-0018Juniper ATP: Persistent Cross-Site Scripting (XSS) vulnerability in file upload menu
CVE-2019-0017Junos Space: Unrestricted file upload vulnerability
CVE-2019-0016Junos Space: Authenticated user able to delete devices without delete device privileges
CVE-2019-0001Junos OS: MX Series: uncontrolled recursion and crash in Broadband Edge subscriber managem
CVE-2019-0014Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packe
CVE-2019-0013Junos OS: RPD crash upon receipt of malformed PIM packet
CVE-2019-0012Junos OS: rpd crash on VPLS PE upon receipt of specific BGP message
CVE-2019-0011Junos OS: Kernel crash after processing specific incoming packet to the out of band manage
CVE-2019-0010Junos OS: SRX Series: Crafted HTTP traffic may cause UTM to consume all mbufs, leading to
CVE-2019-0009Junos OS: EX2300 and EX3400: High disk I/O operations may disrupt the communication betwee

Showing top 20 of 26 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-0020

No comments yet


Leave a comment