CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
23.6%
An Improper Handling of Exceptional Conditions vulnerability in AS PATH processing of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a BGP update message with an AS PATH containing a large number of 4-byte ASes, leading to a Denial of Service (DoS). Continued receipt and processing of these BGP updates will create a sustained Denial of Service (DoS) condition.
This issue is hit when the router has Non-Stop Routing (NSR) enabled, has a non-4-byte-AS capable BGP neighbor, receives a BGP update message with a prefix that includes a long AS PATH containing large number of 4-byte ASes, and has to advertise the prefix towards the non-4-byte-AS capable BGP neighbor.
Note: NSR is not supported on the SRX Series and is therefore not affected by this vulnerability.
This issue affects:
Juniper Networks Junos OS:
Juniper Networks Junos OS Evolved
Vendor | Product | Version | CPE |
---|---|---|---|
juniper | junos | * | cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* |
juniper | junos | 20.4 | cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* |