Vulnerability Description
Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Advanced Threat Prevention Firmware | >= 5.0.0, < 5.0.3 |
| Juniper | Atp400 | - |
| Juniper | Atp700 | - |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA10918Vendor Advisory
- https://kb.juniper.net/JSA10918Vendor Advisory
FAQ
What is CVE-2019-0030?
CVE-2019-0030 is a vulnerability with a CVSS score of 7.2 (HIGH). Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
How severe is CVE-2019-0030?
CVE-2019-0030 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-0030?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Advanced Threat Prevention Firmware, Juniper Atp400, Juniper Atp700.