CVE-2019-0004

On Juniper ATP, the API key and the device key are logged in a file readable by authenticated local users. These keys are used for performing critical operations on the WebUI interface. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
References
Link Resource
https://kb.juniper.net/JSA10918 Vendor Advisory
https://kb.juniper.net/JSA10918 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:juniper:advanced_threat_prevention:*:*:*:*:*:*:*:*
OR cpe:2.3:h:juniper:atp400:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:atp700:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:16

Type Values Removed Values Added
References () https://kb.juniper.net/JSA10918 - Vendor Advisory () https://kb.juniper.net/JSA10918 - Vendor Advisory

Information

Published : 2019-01-15 21:29

Updated : 2024-11-21 04:16


NVD link : CVE-2019-0004

Mitre link : CVE-2019-0004

CVE.ORG link : CVE-2019-0004


JSON object : View

Products Affected

juniper

  • atp400
  • atp700
  • advanced_threat_prevention
CWE
CWE-532

Insertion of Sensitive Information into Log File