CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
45.6%
A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D25 prior to 12.1X46-D71, 12.1X46-D73 on SRX Series; 12.3X48 versions prior to 12.3X48-D50 on SRX Series; 15.1X49 versions prior to 15.1X49-D75 on SRX Series.
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos | * | cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* |
juniper | srx100 | - | cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* |
juniper | srx110 | - | cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* |
juniper | srx1400 | - | cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* |
juniper | srx210 | - | cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* |
juniper | srx220 | - | cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* |
juniper | srx240 | - | cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* |
juniper | srx3400 | - | cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* |
juniper | srx3600 | - | cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* |
juniper | srx5400 | - | cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
45.6%