Lucene search

K
cve[email protected]CVE-2017-10621
HistoryOct 13, 2017 - 5:29 p.m.

CVE-2017-10621

2017-10-1317:29:00
CWE-400
web.nvd.nist.gov
26
2
cve-2017-10621
denial of service
telnetd service
juniper networks
junos os
vulnerability
remote
unauthenticated
attackers

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.1%

A denial of service vulnerability in telnetd service on Juniper Networks Junos OS allows remote unauthenticated attackers to cause a denial of service. Affected Junos OS releases are: 12.1X46 prior to 12.1X46-D71; 12.3X48 prior to 12.3X48-D50; 14.1 prior to 14.1R8-S5, 14.1R9; 14.1X53 prior to 14.1X53-D50; 14.2 prior to 14.2R7-S9, 14.2R8; 15.1 prior to 15.1F2-S16, 15.1F5-S7, 15.1F6-S6, 15.1R5-S2, 15.1R6; 15.1X49 prior to 15.1X49-D90; 15.1X53 prior to 15.1X53-D47; 16.1 prior to 16.1R4-S1, 16.1R5; 16.2 prior to 16.2R1-S3, 16.2R2;

Affected configurations

NVD
Node
juniperjunosMatch12.1x45
OR
juniperjunosMatch12.3x48
OR
juniperjunosMatch14.1
OR
juniperjunosMatch14.1x53
OR
juniperjunosMatch14.2
OR
juniperjunosMatch15.1
OR
juniperjunosMatch15.1x49
OR
juniperjunosMatch15.1x53
OR
juniperjunosMatch16.1
OR
juniperjunosMatch16.2

CNA Affected

[
  {
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "status": "affected",
        "version": "12.1X46 prior to 12.1X46-D71"
      },
      {
        "status": "affected",
        "version": "12.3X48 prior to 12.3X48-D50"
      },
      {
        "status": "affected",
        "version": "14.1 prior to 14.1R8-S5, 14.1R9"
      },
      {
        "status": "affected",
        "version": "14.1X53 prior to 14.1X53-D50"
      },
      {
        "status": "affected",
        "version": "14.2 prior to 14.2R7-S9, 14.2R8"
      },
      {
        "status": "affected",
        "version": "15.1 prior to 15.1F2-S16, 15.1F5-S7, 15.1F6-S6, 15.1R5-S2, 15.1R6"
      },
      {
        "status": "affected",
        "version": "15.1X49 prior to 15.1X49-D90"
      },
      {
        "status": "affected",
        "version": "15.1X53 prior to 15.1X53-D47"
      },
      {
        "status": "affected",
        "version": "16.1 prior to 16.1R4-S1, 16.1R5"
      },
      {
        "status": "affected",
        "version": "16.2 prior to 16.2R1-S3, 16.2R2"
      }
    ]
  }
]

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.1%

Related for CVE-2017-10621