Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-22152— Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface

CVSS 7.7 · High EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-22152

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Contrail Service Orchestration: Tenants able to see other tenants policies via REST API interface
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Protection Mechanism Failure vulnerability in the REST API of Juniper Networks Contrail Service Orchestration allows one tenant on the system to view confidential configuration details of another tenant on the same system. By utilizing the REST API, one tenant is able to obtain information on another tenant's firewall configuration and access control policies, as well as other sensitive information, exposing the tenant to reduced defense against malicious attacks or exploitation via additional undetermined vulnerabilities. This issue affects Juniper Networks Contrail Service Orchestration versions prior to 6.1.0 Patch 3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
保护机制失效
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Contrail Service Orchestration 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Contrail Service Orchestration是美国Juniper Networks公司的一个强大的软件平台。用于连接许多企业和多租户服务提供商解决方案。 Juniper Networks Contrail Service Orchestration 存在访问控制错误漏洞,该漏洞源于产品的REST API中不适当的访问限制。远程攻击者可以查看同一系统中其他租户的机密配置细节。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksContrail Service Orchestration unspecified ~ 6.1.0 Patch 3 -

II. Public POCs for CVE-2022-22152

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-22152

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2022-01-19 · 27 CVEs total

CVE-2022-221537.5 HIGHSRX Series and MX Series with SPC3: A high percentage of fragments might lead to high late
CVE-2022-221807.5 HIGHJunos OS: EX2300 Series, EX2300-MP Series, EX3400 Series: A slow memory leak due to proces
CVE-2022-221787.5 HIGHJunos OS: MX and SRX series: Flowd core observed if the SIP ALG is enabled and a specific
CVE-2022-221597.5 HIGHJunos OS: An attacker sending crafted packets can cause a traffic and CPU Denial of Servic
CVE-2022-221617.5 HIGHJunos OS: MX104 might become unresponsive if the out-of-band management port receives a fl
CVE-2022-221757.5 HIGHJunos OS: MX Series and SRX Series: The flowd daemon will crash if the SIP ALG is enabled
CVE-2022-221747.5 HIGHJunos OS: QFX5000 Series, EX4600: Device may run out of memory, causing traffic loss, upon
CVE-2022-221737.5 HIGHJunos OS: CRL failing to download causes a memory leak and ultimately a DoS
CVE-2022-221717.5 HIGHJunos OS: Specific packets over VXLAN cause FPC reset
CVE-2022-221707.5 HIGHJunos OS: Specific packets over VXLAN cause FPC memory leak and ultimately reset
CVE-2022-221767.4 HIGHJunos OS: In a scenario with dhcp-security and option-82 configured jdhcpd crashes upon re
CVE-2022-221637.4 HIGHJunos OS: jdhcpd crashes upon receipt of a specific DHCPv6 packet
CVE-2022-221627.3 HIGHJunos OS: A low privileged user can elevate their privileges to the ones of the highest pr
CVE-2022-221577.2 HIGHJunos OS: SRX Series: Traffic classification vulnerability when 'no-syn-check' is enabled
CVE-2022-221677.2 HIGHJunos OS: SRX Series: If no-syn-check is enabled, traffic classified as UNKNOWN gets permi
CVE-2022-221546.8 MEDIUMJunos Fusion: A Satellite Device can be controlled by rewiring it to a foreign AD causing
CVE-2022-221726.5 MEDIUMJunos OS and Junos OS Evolved: An l2cpd memory leak can occur when specific LLDP packets a
CVE-2022-221686.5 MEDIUMJunos OS: vMX and MX150: Specific packets might cause a memory leak and eventually an FPC
CVE-2022-221666.5 MEDIUMJunos OS: An rpd core will occur if BGP update tracing is configured and an update contain
CVE-2022-221646.5 MEDIUMJunos OS Evolved: Telnet service may be enabled when it is expected to be disabled.

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-22152

No comments yet


Leave a comment