CVE Published: 15/01/2019 |
CVE Updated: 16/09/2024 |
CVE Year: 2019 Source: juniper |
Vendor: Juniper Networks |
Product: Juniper ATP Status : PUBLISHED
CVE-2019-0030 Description
Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
CWE-ID: CWE-327 CWE Name: CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE-664 - Improper Control of a Resource Through its Lifetime Source: Juniper Networks
Common Attack Pattern Enumeration and Classification (CAPEC)