Lucene search

K
cveJuniperCVE-2018-0056
HistoryOct 10, 2018 - 6:29 p.m.

CVE-2018-0056

2018-10-1018:29:02
CWE-20
juniper
web.nvd.nist.gov
29
cve-2018-0056
juniper
mx series
l2ald
mac address
vpn
junos os
security issue

CVSS2

2.9

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

25.7%

If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. However, the Layer 2 Address Learning Daemon (L2ALD) daemon might crash when attempting to delete the duplicate MAC address when the particular entry is not found in the internal MAC address table. This issue only occurs on MX Series devices with l2-backhaul VPN configured. No other products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S1 on MX Series; 16.1 versions prior to 16.1R4-S12, 16.1R6-S6 on MX Series; 16.2 versions prior to 16.2R2-S7 on MX Series; 17.1 versions prior to 17.1R2-S9 on MX Series; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6 on MX Series; 17.3 versions prior to 17.3R2-S4, 17.3R3-S1 on MX Series; 17.4 versions prior to 17.4R1-S5 on MX Series; 18.1 versions prior to 18.1R2 on MX Series.

Affected configurations

Nvd
Node
juniperjunosMatch15.1
OR
juniperjunosMatch15.1f2
OR
juniperjunosMatch15.1f3
OR
juniperjunosMatch15.1f4
OR
juniperjunosMatch15.1f5
OR
juniperjunosMatch15.1f6
OR
juniperjunosMatch15.1r1
OR
juniperjunosMatch15.1r2
OR
juniperjunosMatch15.1r3
OR
juniperjunosMatch15.1r4
OR
juniperjunosMatch15.1r5
OR
juniperjunosMatch15.1r6
Node
juniperjunosMatch16.1
OR
juniperjunosMatch16.1r1
OR
juniperjunosMatch16.1r2
OR
juniperjunosMatch16.1r3
Node
juniperjunosMatch16.2
OR
juniperjunosMatch16.2r1
Node
juniperjunosMatch17.1
OR
juniperjunosMatch17.1r1
Node
juniperjunosMatch17.2
Node
juniperjunosMatch17.3
OR
juniperjunosMatch17.3r1
Node
juniperjunosMatch17.4
OR
juniperjunosMatch17.4r1
Node
juniperjunosMatch18.1
OR
juniperjunosMatch18.1r1
VendorProductVersionCPE
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*
juniperjunos15.1cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*
Rows per page:
1-10 of 271

CNA Affected

[
  {
    "platforms": [
      "MX Series"
    ],
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "15.1R7-S1",
        "status": "affected",
        "version": "15.1",
        "versionType": "custom"
      },
      {
        "lessThan": "16.1R4-S12, 16.1R6-S6",
        "status": "affected",
        "version": "16.1",
        "versionType": "custom"
      },
      {
        "lessThan": "16.2R2-S7",
        "status": "affected",
        "version": "16.2",
        "versionType": "custom"
      },
      {
        "lessThan": "17.1R2-S9",
        "status": "affected",
        "version": "17.1",
        "versionType": "custom"
      },
      {
        "lessThan": "17.2R1-S7, 17.2R2-S6",
        "status": "affected",
        "version": "17.2",
        "versionType": "custom"
      },
      {
        "lessThan": "17.3R2-S4, 17.3R3-S1",
        "status": "affected",
        "version": "17.3",
        "versionType": "custom"
      },
      {
        "lessThan": "17.4R1-S5",
        "status": "affected",
        "version": "17.4",
        "versionType": "custom"
      },
      {
        "lessThan": "18.1R2",
        "status": "affected",
        "version": "18.1",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

2.9

Attack Vector

ADJACENT_NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:N/I:N/A:P

CVSS3

6.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

25.7%

Related for CVE-2018-0056