ID

VAR-201710-0248


CVE

CVE-2017-10616


TITLE

Juniper Networks Contrail Vulnerabilities related to the use of hard-coded credentials

Trust: 0.8

sources: JVNDB: JVNDB-2017-009387

DESCRIPTION

The ifmap service that comes bundled with Juniper Networks Contrail releases uses hard coded credentials. Affected releases are Contrail releases 2.2 prior to 2.21.4; 3.0 prior to 3.0.3.4; 3.1 prior to 3.1.4.0; 3.2 prior to 3.2.5.0. CVE-2017-10616 and CVE-2017-10617 can be chained together and have a combined CVSSv3 score of 5.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N). This vulnerability CVE-2017-10617 And related issues.Information may be obtained and information may be altered. The solution provides intelligent automation, application security and reliability for cloud and NFV. A remote attacker could exploit this vulnerability to retrieve sensitive system files. The following versions are affected: Juniper Contrail version 2.2, version 3.0, version 3.1, version 3.2

Trust: 1.8

sources: NVD: CVE-2017-10616 // JVNDB: JVNDB-2017-009387 // VULHUB: VHN-100956 // VULMON: CVE-2017-10616

AFFECTED PRODUCTS

vendor:junipermodel:contrailscope:eqversion:3.0

Trust: 1.6

vendor:junipermodel:contrailscope:eqversion:3.2

Trust: 1.6

vendor:junipermodel:contrailscope:eqversion:2.2

Trust: 1.6

vendor:junipermodel:contrailscope:eqversion:3.1

Trust: 1.6

vendor:junipermodel:contrailscope:ltversion:3.1

Trust: 0.8

vendor:junipermodel:contrailscope:ltversion:3.0

Trust: 0.8

vendor:junipermodel:contrailscope:eqversion:3.2.5.0

Trust: 0.8

vendor:junipermodel:contrailscope:ltversion:3.2

Trust: 0.8

vendor:junipermodel:contrailscope:eqversion:3.1.4.0

Trust: 0.8

vendor:junipermodel:contrailscope:ltversion:2.2

Trust: 0.8

vendor:junipermodel:contrailscope:eqversion:3.0.3.4

Trust: 0.8

vendor:junipermodel:contrailscope:eqversion:2.21.4

Trust: 0.8

sources: JVNDB: JVNDB-2017-009387 // CNNVD: CNNVD-201710-511 // NVD: CVE-2017-10616

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-10616
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2017-10616
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-10616
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201710-511
value: MEDIUM

Trust: 0.6

VULHUB: VHN-100956
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-10616
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-10616
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-100956
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sirt@juniper.net: CVE-2017-10616
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2017-10616
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-100956 // VULMON: CVE-2017-10616 // JVNDB: JVNDB-2017-009387 // CNNVD: CNNVD-201710-511 // NVD: CVE-2017-10616 // NVD: CVE-2017-10616

PROBLEMTYPE DATA

problemtype:CWE-798

Trust: 1.9

sources: VULHUB: VHN-100956 // JVNDB: JVNDB-2017-009387 // NVD: CVE-2017-10616

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201710-511

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201710-511

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009387

PATCH

title:JSA10819url:https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10819&actp=METADATA

Trust: 0.8

title:Juniper Contrail Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=75547

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2017-10617

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2017-10616

Trust: 0.1

sources: VULMON: CVE-2017-10616 // JVNDB: JVNDB-2017-009387 // CNNVD: CNNVD-201710-511

EXTERNAL IDS

db:NVDid:CVE-2017-10616

Trust: 2.6

db:JUNIPERid:JSA10819

Trust: 1.8

db:JVNDBid:JVNDB-2017-009387

Trust: 0.8

db:CNNVDid:CNNVD-201710-511

Trust: 0.7

db:VULHUBid:VHN-100956

Trust: 0.1

db:VULMONid:CVE-2017-10616

Trust: 0.1

sources: VULHUB: VHN-100956 // VULMON: CVE-2017-10616 // JVNDB: JVNDB-2017-009387 // CNNVD: CNNVD-201710-511 // NVD: CVE-2017-10616

REFERENCES

url:https://kb.juniper.net/jsa10819

Trust: 1.8

url:https://github.com/orangecertcc/security-research/security/advisories/ghsa-qx9c-49m4-f3vj

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10616

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-10616

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/798.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2017-10617

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-100956 // VULMON: CVE-2017-10616 // JVNDB: JVNDB-2017-009387 // CNNVD: CNNVD-201710-511 // NVD: CVE-2017-10616

SOURCES

db:VULHUBid:VHN-100956
db:VULMONid:CVE-2017-10616
db:JVNDBid:JVNDB-2017-009387
db:CNNVDid:CNNVD-201710-511
db:NVDid:CVE-2017-10616

LAST UPDATE DATE

2025-04-20T23:12:53.899000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-100956date:2023-01-13T00:00:00
db:VULMONid:CVE-2017-10616date:2023-01-13T00:00:00
db:JVNDBid:JVNDB-2017-009387date:2017-11-10T00:00:00
db:CNNVDid:CNNVD-201710-511date:2023-01-19T00:00:00
db:NVDid:CVE-2017-10616date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-100956date:2017-10-13T00:00:00
db:VULMONid:CVE-2017-10616date:2017-10-13T00:00:00
db:JVNDBid:JVNDB-2017-009387date:2017-11-10T00:00:00
db:CNNVDid:CNNVD-201710-511date:2017-10-18T00:00:00
db:NVDid:CVE-2017-10616date:2017-10-13T17:29:00.783