Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-0032


A password management issue exists where the Organization authentication username and password were stored in plaintext in log files. A locally authenticated attacker who is able to access these stored plaintext credentials can use them to login to the Organization. Affected products are: Juniper Networks Service Insight versions from 15.1R1, prior to 18.1R1. Service Now versions from 15.1R1, prior to 18.1R1.


Published

2019-04-10T20:29:00.537

Last Modified

2024-11-21T04:16:05.457

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-256
  • Type: Primary
    CWE-522
    CWE-532

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application juniper service_insight < 18.1r1 Yes
Application juniper service_now < 18.1r1 Yes

References