Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-87m6-hv55-49cw

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 10

Описание

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.

EPSS

Процентиль: 65%
0.00502
Низкий

10 Critical

CVSS3

Дефекты

CWE-330

Связанные уязвимости

CVSS3: 9.3
nvd
около 7 лет назад

The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.

CVSS3: 9.3
fstec
около 7 лет назад

Уязвимость операционной системы JunOS, позволяющая нарушителю выполнять атаки с использованием предсказуемых IP ID

EPSS

Процентиль: 65%
0.00502
Низкий

10 Critical

CVSS3

Дефекты

CWE-330