Lucene search

K
cveJuniperCVE-2020-1648
HistoryJul 17, 2020 - 7:15 p.m.

CVE-2020-1648

2020-07-1719:15:13
CWE-159
CWE-690
juniper
web.nvd.nist.gov
31
cve-2020-1648
juniper networks
junos os
bgp
dos
nvd
vulnerability

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

42.5%

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later versions, prior to 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70; 19.4 versions 19.4R1 and 19.4R1-S1; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: 19.4-EVO versions prior to 19.4R2-S2-EVO; 20.1-EVO versions prior to 20.1R2-EVO. This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.

Affected configurations

Nvd
Node
juniperjunosMatch18.2x75
OR
juniperjunosMatch18.2x75-
OR
juniperjunosMatch18.2x75d20
OR
juniperjunosMatch18.2x75d30
OR
juniperjunosMatch18.2x75d40
OR
juniperjunosMatch19.4r1
OR
juniperjunosMatch19.4r1-s1
OR
juniperjunosMatch20.1r1
OR
juniperjunosMatch20.1r1-s1
OR
juniperjunos_os_evolvedMatch19.4r1
OR
juniperjunos_os_evolvedMatch19.4r2
OR
juniperjunos_os_evolvedMatch19.4r2-s1
OR
juniperjunos_os_evolvedMatch20.1r1
VendorProductVersionCPE
juniperjunos18.2x75cpe:2.3:o:juniper:junos:18.2x75:*:*:*:*:*:*:*
juniperjunos18.2x75cpe:2.3:o:juniper:junos:18.2x75:-:*:*:*:*:*:*
juniperjunos18.2x75cpe:2.3:o:juniper:junos:18.2x75:d20:*:*:*:*:*:*
juniperjunos18.2x75cpe:2.3:o:juniper:junos:18.2x75:d30:*:*:*:*:*:*
juniperjunos18.2x75cpe:2.3:o:juniper:junos:18.2x75:d40:*:*:*:*:*:*
juniperjunos19.4cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
juniperjunos19.4cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
juniperjunos20.1cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*
juniperjunos20.1cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*
juniperjunos_os_evolved19.4cpe:2.3:o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*
Rows per page:
1-10 of 131

CNA Affected

[
  {
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70",
            "status": "unaffected"
          }
        ],
        "lessThan": "18.2X75*",
        "status": "affected",
        "version": "18.2X75-D50.8 18.2X75-D60",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "19.4R1",
            "status": "affected"
          },
          {
            "at": "19.4R1-S2, 19.4R2",
            "status": "unaffected"
          }
        ],
        "lessThan": "19.4R1",
        "status": "unaffected",
        "version": "19.4",
        "versionType": "custom"
      },
      {
        "lessThan": "20.1R1-S2, 20.1R2",
        "status": "affected",
        "version": "20.1",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Junos OS Evolved",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "19.4R2-S2-EVO",
            "status": "unaffected"
          }
        ],
        "lessThan": "19.4R1-EVO",
        "status": "unaffected",
        "version": "19.4-EVO",
        "versionType": "custom"
      },
      {
        "lessThan": "20.1R2-EVO",
        "status": "affected",
        "version": "20.1-EVO",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

42.5%

Related for CVE-2020-1648