CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
21.9%
An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the management daemon (mgd) process of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated low-privileged attacker, by executing a specific command via NETCONF, to cause a CPU Denial of Service to the device’s control plane.
This issue affects:
Juniper Networks Junos OS
Juniper Networks Junos OS Evolved
An indicator of compromise can be seen by first determining if the NETCONF client is logged in and fails to log out after a reasonable period of time and secondly reviewing the WCPU percentage for the mgd process by running the following command:
mgd process example:
user@device-re#> show system processes extensive | match “mgd|PID” | except last
PID USERNAME PRI NICE SIZE RES STATE C TIME WCPU COMMAND
92476 root 100 0 500M 89024K CPU3 3 57.5H 89.60% mgd <<<<<<<<<<< review the high cpu percentage.
Example to check for NETCONF activity:
While there is no specific command that shows a specific session in use for NETCONF, you can review logs for UI_LOG_EVENT with “client-mode ‘netconf’”
For example:
mgd[38121]: UI_LOGIN_EVENT: User ‘root’ login, class ‘super-user’ [38121], ssh-connection ‘10.1.1.1 201 55480 10.1.1.2 22’, client-mode ‘netconf’
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos | * | cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* |