CVE-2014-3413

The MySQL server in Juniper Networks Junos Space before 13.3R1.8 has an unspecified account with a hardcoded password, which allows remote attackers to obtain sensitive information and consequently obtain administrative control by leveraging database access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:juniper:junos_space:13.3:r1.1:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:13.3:r1.2:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:13.3:r1.3:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:13.3:r1.4:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:13.3:r1.5:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:13.3:r1.6:*:*:*:*:*:*
cpe:2.3:a:juniper:junos_space:13.3:r1.7:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10627 - Vendor Advisory () https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10627 - Vendor Advisory
References () https://www.tenable.com/security/research/tra-2014-01 - Third Party Advisory () https://www.tenable.com/security/research/tra-2014-01 - Third Party Advisory

Information

Published : 2018-04-05 17:29

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3413

Mitre link : CVE-2014-3413

CVE.ORG link : CVE-2014-3413


JSON object : View

Products Affected

juniper

  • junos_space
CWE
CWE-798

Use of Hard-coded Credentials