CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
17.0%
An Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on MX Series and EX9200 Series allows an unauthenticated, network-based attacker to cause partial impact to the integrity of the device.
If the “tcp-reset” option is added to the “reject” action in an IPv6 filter which matches on “payload-protocol”, packets are permitted instead of rejected. This happens because the payload-protocol match criteria is not supported in the kernel filter causing it to accept all packets without taking any other action. As a fix the payload-protocol match will be treated the same as a “next-header” match to avoid this filter bypass.
This issue doesn’t affect IPv4 firewall filters.
This issue affects Juniper Networks Junos OS on MX Series and EX9200 Series:
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos | * | cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* |