5.5
CVSSv2

CVE-2021-0279

Published: 15/07/2021 Updated: 27/07/2021
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 5.5 | Impact Score: 4.2 | Exploitability Score: 1.2
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P

Vulnerability Summary

Juniper Networks Contrail Cloud (CC) releases before 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials. The messaging services of RabbitMQ are used when coordinating operations and status information among Contrail services. An attacker with access to an administrative service for RabbitMQ (e.g. GUI), can use these hardcoded credentials to cause a Denial of Service (DoS) or have access to unspecified sensitive system information. This issue affects the Juniper Networks Contrail Cloud releases on versions before 13.6.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper contrail cloud