Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-1640

Опубликовано: 17 июл. 2020
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By continuously sending any of these types of formatted genuine packets, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. Authentication to the BGP peer is not required. This issue can be initiated or propagated through eBGP and iBGP and can impact devices in either modes of use as long as the devices are configured to support the compromised framework and a BGP path is activated or active. This issue affects: Juniper Networks Junos OS 16.1 versions 16.1R7-S6 and later versions prior to 16.1R7-S8; 17.3 versions 17.3R2-S5, 17.3R3-S6 and later versions prior to 17.3R3-S8; 17.4 versions 17.4R2-S7, 17.4R3 and later versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:d12:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:d411:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.2x75:d51:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*

EPSS

Процентиль: 63%
0.00448
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-1173
CWE-20

Связанные уязвимости

github
больше 3 лет назад

An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By continuously sending any of these types of formatted genuine packets, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. Authentication to the BGP peer is not required. This issue can be initiated or propagated through eBGP and iBGP and can impact devices in either modes of use as long as the devices are configured to support the compromised framework and a BGP path is activated or active. This issue affects: Juniper Networks Junos OS 16.1 versions 16.1R7-S6 and later versions prior to 16.1R7-S8; 17.3 versions 17.3R2-S5, 17.3R3-S6 and later versions prior to 17.3R3-S8; 17.4 versions 17.4R2-S7, 17.4R3 and later versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versio...

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость реализации протокола BGP операционной системы JunOS, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 63%
0.00448
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-1173
CWE-20