Show plain JSON{"id": "CVE-2017-10616", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Secondary", "source": "sirt@juniper.net", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2017-10-13T17:29:00.783", "references": [{"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-qx9c-49m4-f3vj", "tags": ["Third Party Advisory"], "source": "sirt@juniper.net"}, {"url": "https://kb.juniper.net/JSA10819", "tags": ["Vendor Advisory"], "source": "sirt@juniper.net"}, {"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-qx9c-49m4-f3vj", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://kb.juniper.net/JSA10819", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-798"}]}], "descriptions": [{"lang": "en", "value": "The ifmap service that comes bundled with Juniper Networks Contrail releases uses hard coded credentials. Affected releases are Contrail releases 2.2 prior to 2.21.4; 3.0 prior to 3.0.3.4; 3.1 prior to 3.1.4.0; 3.2 prior to 3.2.5.0. CVE-2017-10616 and CVE-2017-10617 can be chained together and have a combined CVSSv3 score of 5.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)."}, {"lang": "es", "value": "El servicio ifmap que viene incorporado en las distribuciones de Juniper Networks Contrail utiliza credenciales embebidas. Las distribuciones afectadas son Contrail 2.2 anteriores a la 2.21.4; 3.0 anteriores a la 3.0.3.4; 3.1 anteriores a la 3.1.4.0; 3.2 anteriores a la 3.2.5.0. CVE-2017-10616 y CVE-2017-10617 se pueden agrupar y tienen una puntuaci\u00f3n CVSSv3 combinada de 5.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:juniper:contrail:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77D768A0-E869-4FB9-AAC1-DD570F276D4B"}, {"criteria": "cpe:2.3:a:juniper:contrail:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33081EFF-406E-4E46-892B-F6E282EB4478"}, {"criteria": "cpe:2.3:a:juniper:contrail:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09D6D198-F6DC-4D08-97E3-DB8CD9D5A4EC"}, {"criteria": "cpe:2.3:a:juniper:contrail:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A239421-26E2-4B3D-964E-899F4C533FC2"}], "operator": "OR"}]}], "sourceIdentifier": "sirt@juniper.net"}