CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
42.5%
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue does not affect IPv4 BGP sessions. This issue affects IBGP or EBGP peer sessions with IPv6. This issue affects: Juniper Networks Junos OS Evolved: 19.4 versions prior to 19.4R2-S3-EVO; 20.1 versions prior to 20.1R2-S3-EVO; 20.2 versions prior to 20.2R2-S1-EVO; 20.3 versions prior to 20.3R2-EVO. This issue does not affect Juniper Networks Junos OS releases.
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos_os_evolved | 20.1 | cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.1 | cpe:2.3:o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.1 | cpe:2.3:o:juniper:junos_os_evolved:20.1:r2:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.1 | cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.1 | cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s2:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.2 | cpe:2.3:o:juniper:junos_os_evolved:20.2:r1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.2 | cpe:2.3:o:juniper:junos_os_evolved:20.2:r1-s1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.2 | cpe:2.3:o:juniper:junos_os_evolved:20.2:r2:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.3 | cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:* |
juniper | junos_os_evolved | 20.3 | cpe:2.3:o:juniper:junos_os_evolved:20.3:r1-s1:*:*:*:*:*:* |
[
{
"product": "Junos OS Evolved",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "19.4R2-S3-EVO",
"status": "affected",
"version": "19.4-EVO",
"versionType": "custom"
},
{
"lessThan": "20.1R2-S3-EVO",
"status": "affected",
"version": "20.1-EVO",
"versionType": "custom"
},
{
"lessThan": "20.2R2-S1-EVO",
"status": "affected",
"version": "20.2-EVO",
"versionType": "custom"
},
{
"lessThan": "20.3R2-EVO",
"status": "affected",
"version": "20.3-EVO",
"versionType": "custom"
}
]
}
]
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
42.5%