Lucene search

K
cve[email protected]CVE-2018-0037
HistoryJul 11, 2018 - 6:29 p.m.

CVE-2018-0037

2018-07-1118:29:00
CWE-20
web.nvd.nist.gov
26
cve-2018-0037
junos os
rpd process
bgp
notification
denial of service
remote code execution
nvd
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.2%

Junos OS routing protocol daemon (RPD) process may crash and restart or may lead to remote code execution while processing specific BGP NOTIFICATION messages. By continuously sending crafted BGP NOTIFICATION messages, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. Due to design improvements, this issue does not affect Junos OS 16.1R1, and all subsequent releases. This issue only affects the receiving BGP device and is non-transitive in nature. Affected releases are Juniper Networks Junos OS: 15.1F5 versions starting from 15.1F5-S7 and all subsequent releases; 15.1F6 versions starting from 15.1F6-S3 and later releases prior to 15.1F6-S10; 15.1F7 versions 15.1 versions starting from 15.1R5 and later releases, including the Service Releases based on 15.1R5 and on 15.1R6 prior to 15.1R6-S6 and 15.1R7;

Affected configurations

NVD
Node
juniperjunosMatch15.1f2
OR
juniperjunosMatch15.1f5-s7
OR
juniperjunosMatch15.1f6
OR
juniperjunosMatch15.1f6-s3
OR
juniperjunosMatch15.1f7
OR
juniperjunosMatch15.1r3
OR
juniperjunosMatch15.1r5
OR
juniperjunosMatch15.1r7
CPENameOperatorVersion
juniper:junosjuniper junoseq15.1

CNA Affected

[
  {
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "15.1F5*",
        "status": "affected",
        "version": "15.1F5-S7",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "15.1F6-S10 ",
            "status": "unaffected"
          }
        ],
        "lessThan": "15.1F6*",
        "status": "affected",
        "version": "15.1F6-S3",
        "versionType": "custom"
      },
      {
        "lessThan": "15.1F7*",
        "status": "affected",
        "version": "15.1F7",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "15.1R6-S6, 15.1R7",
            "status": "unaffected"
          }
        ],
        "lessThan": "15.1*",
        "status": "affected",
        "version": "15.1R5",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.014 Low

EPSS

Percentile

86.2%

Related for CVE-2018-0037