CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
64.4%
Juniper Junos OS before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R10, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R8, 13.3 before 13.3R7, 14.1 before 14.1R5, and 14.2 before 14.2R1 do not properly handle TCP packet reassembly, which allows remote attackers to cause a denial of service (buffer consumption) via a crafted sequence of packets “destined to the device.”
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d10:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d15:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d20:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d25:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d30:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d35:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d40:*:*:*:*:*:* |
juniper | junos | 12.1x44 | cpe:2.3:o:juniper:junos:12.1x44:d45:*:*:*:*:*:* |
juniper | junos | 12.1x46 | cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:* |