Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-1633

Опубликовано: 09 апр. 2020
Источник: nvd
CVSS3: 7.4
CVSS3: 6.5
CVSS2: 3.3
EPSS Низкий

Описание

Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, leading to a Denial of Service (DoS) condition. This issue only affects Junos OS 17.4 and later releases. Prior releases do not support this feature and are unaffected by this vulnerability. This issue only affects IPv6. IPv4 ARP proxy is unaffected by this vulnerability. This issue affects Juniper Networks Junos OS: 17.4 versions prior to 17.4R2-S9, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S9 on MX Series; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on MX Series; 18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60 on MX Series; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3 on MX Series; 18.4 versions prior to 18.4R1-S5, 18.4R2-S2, 18.4R3 on MX Series;

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:d20:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:d30:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*

Одно из

cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*

EPSS

Процентиль: 29%
0.00107
Низкий

7.4 High

CVSS3

6.5 Medium

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-20
NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, leading to a Denial of Service (DoS) condition. This issue only affects Junos OS 17.4 and later releases. Prior releases do not support this feature and are unaffected by this vulnerability. This issue only affects IPv6. IPv4 ARP proxy is unaffected by this vulnerability. This issue affects Juniper Networks Junos OS: 17.4 versions prior to 17.4R2-S9, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S9 on MX Series; 18.2 versions prior to 18.2R2-S7, 18.2R3-S3 on MX Series; 18.2X75 versions prior to 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60 on MX Series; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3 on MX Series; 18.4 versions prior to 18.4R1-S5, 18.4R2-S2, 18.4R3 on MX Seri...

CVSS3: 7.4
fstec
почти 6 лет назад

Уязвимость компонента NDP Proxy операционной системы JunOS, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 29%
0.00107
Низкий

7.4 High

CVSS3

6.5 Medium

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-20
NVD-CWE-noinfo