Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-0212— Contrail Networking: Administrator credentials are exposed in a plaintext file

CVSS 5.0 · Medium EPSS 0.04% · P11
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-0212

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Contrail Networking: Administrator credentials are exposed in a plaintext file
Source: NVD (National Vulnerability Database)
Vulnerability Description
An Information Exposure vulnerability in Juniper Networks Contrail Networking allows a locally authenticated attacker able to read files to retrieve administrator credentials stored in plaintext thereby elevating their privileges over the system. This issue affects: Juniper Networks Contrail Networking versions prior to 1911.31.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Contrail Networking 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Contrail Networking是美国瞻博(Juniper Networks)公司的一款可为网络虚拟化、云管理平台提供动态的端到端联网策略以及控制管理的软件。 Juniper Networks Contrail Networking 存在信息泄露漏洞,该漏洞允许本地身份验证的攻击者能够读取文件,检索明文存储的管理员凭证,从而提高他们对系统的特权。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksContrail Networking unspecified ~ 1911.31 -

II. Public POCs for CVE-2021-0212

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-0212

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2021-01-15 · 19 CVEs total

CVE-2021-021110.0 CRITICALJunos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network tra
CVE-2021-02088.8 HIGHJunos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router
CVE-2021-02038.6 HIGHJunos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trun
CVE-2021-02047.8 HIGHJunos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02187.8 HIGHJunos OS: Command injection vulnerability in license-check daemon
CVE-2021-02237.8 HIGHJunos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02067.5 HIGHJunos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL P
CVE-2021-02077.5 HIGHNFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Se
CVE-2021-02027.5 HIGHJunos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and
CVE-2021-02177.4 HIGHJunos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets
CVE-2021-02227.4 HIGHJunos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagatin
CVE-2021-02106.8 MEDIUMJunos OS: Privilege escalation in J-Web due to arbitrary command and code execution via in
CVE-2021-02206.8 MEDIUMJunos Space: Shared secrets stored in recoverable format and directly exposed through the
CVE-2021-02196.7 MEDIUMJunos OS: Command injection vulnerability in 'request system software' CLI command
CVE-2021-02096.5 MEDIUMJunos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD
CVE-2021-02156.5 MEDIUMJunos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwa
CVE-2021-02216.5 MEDIUMJunos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP mul
CVE-2021-02055.8 MEDIUMJunos OS: MX Series: Dynamic filter fails to match IPv6 prefix

IV. Related Vulnerabilities

V. Comments for CVE-2021-0212

No comments yet


Leave a comment