CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
21.8%
An Improper Input Validation vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause DoS (Denial of Service). If another router generates more than one specific valid OSPFv3 LSA then rpd will crash while processing these LSAs. This issue only affects systems configured with OSPFv3, while OSPFv2 is not affected. This issue affects: Juniper Networks Junos OS 19.2 versions prior to 19.2R3-S6; 19.3 version 19.3R2 and later versions; 19.4 versions prior to 19.4R2-S8, 19.4R3-S9; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R2. Juniper Networks Junos OS Evolved All versions prior to 20.4R3-S5-EVO; 21.1-EVO versions prior to 21.1R3-S2-EVO; 21.2-EVO versions prior to 21.2R3-S1-EVO; 21.3-EVO versions prior to 21.3R3-S2-EVO; 21.4-EVO versions prior to 21.4R2-EVO; 22.1-EVO versions prior to 22.1R2-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS 19.2 versions prior to 19.2R2.
[
{
"vendor": "Juniper Networks",
"product": "Junos OS",
"versions": [
{
"version": "19.2",
"status": "affected",
"lessThan": "19.2R3-S6",
"versionType": "custom",
"changes": [
{
"at": "19.2R2",
"status": "affected"
}
]
},
{
"version": "19.3R2",
"status": "affected",
"lessThan": "19.3*",
"versionType": "custom"
},
{
"version": "19.4",
"status": "affected",
"lessThan": "19.4R2-S8, 19.4R3-S9",
"versionType": "custom"
},
{
"version": "20.1R1",
"status": "affected",
"lessThan": "20.1*",
"versionType": "custom"
},
{
"version": "20.2",
"status": "affected",
"lessThan": "20.2R3-S5",
"versionType": "custom"
},
{
"version": "20.3",
"status": "affected",
"lessThan": "20.3R3-S5",
"versionType": "custom"
},
{
"version": "20.4",
"status": "affected",
"lessThan": "20.4R3-S4",
"versionType": "custom"
},
{
"version": "21.1",
"status": "affected",
"lessThan": "21.1R3-S2",
"versionType": "custom"
},
{
"version": "21.2",
"status": "affected",
"lessThan": "21.2R3-S1",
"versionType": "custom"
},
{
"version": "21.3",
"status": "affected",
"lessThan": "21.3R3-S2",
"versionType": "custom"
},
{
"version": "21.4",
"status": "affected",
"lessThan": "21.4R2",
"versionType": "custom"
}
]
},
{
"vendor": "Juniper Networks",
"product": "Junos OS Evolved",
"versions": [
{
"version": "unspecified",
"lessThan": "20.4R3-S5-EVO",
"status": "affected",
"versionType": "custom"
},
{
"version": "21.1-EVO",
"status": "affected",
"lessThan": "21.1R3-S2-EVO",
"versionType": "custom"
},
{
"version": "21.2-EVO",
"status": "affected",
"lessThan": "21.2R3-S1-EVO",
"versionType": "custom"
},
{
"version": "21.3-EVO",
"status": "affected",
"lessThan": "21.3R3-S2-EVO",
"versionType": "custom"
},
{
"version": "21.4-EVO",
"status": "affected",
"lessThan": "21.4R2-EVO",
"versionType": "custom"
},
{
"version": "22.1-EVO",
"status": "affected",
"lessThan": "22.1R2-EVO",
"versionType": "custom"
},
{
"version": "22.2-EVO",
"status": "affected",
"lessThan": "22.2R2-EVO",
"versionType": "custom"
}
]
}
]