- What is the severity of CVE-2021-0279?
- CVE-2021-0279 has been scored as a high severity vulnerability.
- How to fix CVE-2021-0279?
- To fix CVE-2021-0279: The following software releases have been updated to resolve this specific issue: Juniper Networks Contrail Cloud version 13.6.0, and all subsequent releases. When installing Contrail Cloud version 13.6.0, to set a non-default password for RabbitMQ, one of these options are possible: a) You may set a non-default password using the config/vault-data.yml file. b) Or following configuration should be added to the CC site.yml file: extra_config: ContrailAnalyticsParameters: ContrailSettings: RABBITMQ_PASSWORD: "{{ vault['other']['credentials']['contrail_rabbit']['password'] }}" RABBITMQ_USER: "{{ vault['other']['credentials']['contrail_rabbit']['user'] }}" ContrailControllerParameters: ContrailSettings: RABBITMQ_PASSWORD: "{{ vault['other']['credentials']['contrail_rabbit']['password'] }}" RABBITMQ_USER: "{{ vault['other']['credentials']['contrail_rabbit']['user'] }}" Contact Juniper Networks Technical Assistance Center (JTAC) for guided assistance if necessary.
- Is CVE-2021-0279 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2021-0279 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2021-0279?
- CVE-2021-0279 affects Juniper Networks Contrail Cloud.