Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-10618

Summary
Assigner-juniper
Assigner Org ID-8cbe9d5a-a066-4c94-8978-4b15efeae968
Published At-13 Oct, 2017 | 17:00
Updated At-17 Sep, 2024 | 04:04
Rejected At-
Credits

Junos: RPD core due to BGP UPDATE with malformed optional transitive attributes

When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. Devices with BGP enabled that do not have 'bgp-error-tolerance' configured are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS 13.3 prior to 13.3R10-S2; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X50 prior to 14.1X50-D185; 14.1X53 prior to 14.1X53-D45, 14.1X53-D50; 14.2 prior to 14.2R7-S7, 14.2R8; 15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D64, 15.1X53-D70; 16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5; 16.2 prior to 16.2R1-S5, 16.2R2; 17.1 prior to 17.1R1-S3, 17.1R2; 17.2 prior to 17.2R1-S2, 17.2R2; 17.2X75 prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:juniper
Assigner Org ID:8cbe9d5a-a066-4c94-8978-4b15efeae968
Published At:13 Oct, 2017 | 17:00
Updated At:17 Sep, 2024 | 04:04
Rejected At:
▼CVE Numbering Authority (CNA)
Junos: RPD core due to BGP UPDATE with malformed optional transitive attributes

When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. Devices with BGP enabled that do not have 'bgp-error-tolerance' configured are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS 13.3 prior to 13.3R10-S2; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X50 prior to 14.1X50-D185; 14.1X53 prior to 14.1X53-D45, 14.1X53-D50; 14.2 prior to 14.2R7-S7, 14.2R8; 15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D64, 15.1X53-D70; 16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5; 16.2 prior to 16.2R1-S5, 16.2R2; 17.1 prior to 17.1R1-S3, 17.1R2; 17.2 prior to 17.2R1-S2, 17.2R2; 17.2X75 prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.

Affected Products
Vendor
Juniper Networks, Inc.Juniper Networks
Product
Junos OS
Versions
Affected
  • 13.3 prior to 13.3R10-S2
  • 14.1 prior to 14.1R8-S4, 14.1R9
  • 14.1X50 prior to 14.1X50-D185
  • 14.1X53 prior to 14.1X53-D45, 14.1X53-D50
  • 14.2 prior to 14.2R7-S7, 14.2R8
  • 15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7
  • 15.1X49 prior to 15.1X49-D100
  • 15.1X53 prior to 15.1X53-D64, 15.1X53-D70
  • 16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5
  • 16.2 prior to 16.2R1-S5, 16.2R2
  • 17.1 prior to 17.1R1-S3, 17.1R2
  • 17.2 prior to 17.2R1-S2, 17.2R2
  • 17.2X75 prior to 17.2X75-D50
Problem Types
TypeCWE IDDescription
textN/ADenial of service
Type: text
CWE ID: N/A
Description: Denial of service
Metrics
VersionBase scoreBase severityVector
3.05.9MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.0
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

This only affects devices with 'bgp-error-tolerance' feature enabled.

Workarounds

If 'bgp-error-tolerance' is enabled, disabling this option under 'protocols bgp' will mitigate this issue. Note that when the error handling feature is off, the router is vulnerable to session resets from malformed path attributes. However, this is RFC 4271 compliant behavior.

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.html
x_refsource_MISC
https://kb.juniper.net/JSA10820
x_refsource_CONFIRM
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.html
x_refsource_MISC
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.html
Resource:
x_refsource_MISC
Hyperlink: https://kb.juniper.net/JSA10820
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.html
x_refsource_MISC
x_transferred
https://kb.juniper.net/JSA10820
x_refsource_CONFIRM
x_transferred
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.html
x_refsource_MISC
x_transferred
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://kb.juniper.net/JSA10820
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.html
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:sirt@juniper.net
Published At:13 Oct, 2017 | 17:29
Updated At:20 Apr, 2025 | 01:37

When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. Devices with BGP enabled that do not have 'bgp-error-tolerance' configured are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS 13.3 prior to 13.3R10-S2; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X50 prior to 14.1X50-D185; 14.1X53 prior to 14.1X53-D45, 14.1X53-D50; 14.2 prior to 14.2R7-S7, 14.2R8; 15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D64, 15.1X53-D70; 16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5; 16.2 prior to 16.2R1-S5, 16.2R2; 17.1 prior to 17.1R1-S3, 17.1R2; 17.2 prior to 17.2R1-S2, 17.2R2; 17.2X75 prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.05.9MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary3.05.9MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Type: Secondary
Version: 3.0
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.0
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r10:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r7:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r8:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>13.3
cpe:2.3:o:juniper:junos:13.3:r9:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1
cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x50
cpe:2.3:o:juniper:junos:14.1x50:*:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x50
cpe:2.3:o:juniper:junos:14.1x50:d60:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d42:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d43:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d44:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.1x53
cpe:2.3:o:juniper:junos:14.1x53:d50:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:*:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r6:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>14.2
cpe:2.3:o:juniper:junos:14.2:r8:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>15.1
cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>15.1
cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>15.1
cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>15.1
cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*
Juniper Networks, Inc.
juniper
>>junos>>15.1
cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://kb.juniper.net/JSA10820sirt@juniper.net
Mitigation
Vendor Advisory
https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.htmlsirt@juniper.net
Vendor Advisory
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.htmlsirt@juniper.net
Vendor Advisory
https://kb.juniper.net/JSA10820af854a3a-2127-422b-91ae-364da2661108
Mitigation
Vendor Advisory
https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://kb.juniper.net/JSA10820
Source: sirt@juniper.net
Resource:
Mitigation
Vendor Advisory
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.html
Source: sirt@juniper.net
Resource:
Vendor Advisory
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.html
Source: sirt@juniper.net
Resource:
Vendor Advisory
Hyperlink: https://kb.juniper.net/JSA10820
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mitigation
Vendor Advisory
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/concept/bgp-error-handling-overview.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.juniper.net/documentation/en_US/junos/topics/reference/configuration-statement/bgp-error-tolerance.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

52Records found

CVE-2021-0263
Matching Score-8
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-8
Assigner-Juniper Networks, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.31% / 53.76%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 19:37
Updated-16 Sep, 2024 | 20:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: PTX Series: Denial of Service in packet processing due to heavy route churn when J-Flow sampling is enabled

A Data Processing vulnerability in the Multi-Service process (multi-svcs) on the FPC of Juniper Networks Junos OS on the PTX Series routers may lead to the process becoming unresponsive, ultimately affecting traffic forwarding, allowing an attacker to cause a Denial of Service (DoS) condition . The Multi-Service Process running on the FPC is responsible for handling sampling-related operations when a J-Flow configuration is activated. This can occur during periods of heavy route churn, causing the Multi-Service Process to stop processing updates, without consuming any further updates from kernel. This back pressure towards the kernel affects further dynamic updates from other processes in the system, including RPD, causing a KRT-STUCK condition and traffic forwarding issues. An administrator can monitor the following command to check if there is the KRT queue is stuck: user@device > show krt state ... Number of async queue entries: 65007 <--- this value keep on increasing. The following logs/alarms will be observed when this condition exists: user@junos> show chassis alarms 2 alarms currently active Alarm time Class Description 2020-10-11 04:33:45 PDT Minor Potential slow peers are: MSP(FPC1-PIC0) MSP(FPC3-PIC0) MSP(FPC4-PIC0) Logs: Oct 11 04:33:44.672 2020 test /kernel: rts_peer_cp_recv_timeout : Bit set for msp8 as it is stuck Oct 11 04:35:56.000 2020 test-lab fpc4 user.err gldfpc-multi-svcs.elf: Error in parsing composite nexthop Oct 11 04:35:56.000 2020 test-lab fpc4 user.err gldfpc-multi-svcs.elf: composite nexthop parsing error Oct 11 04:43:05 2020 test /kernel: rt_pfe_veto: Possible slowest client is msp38. States processed - 65865741. States to be processed - 0 Oct 11 04:55:55 2020 test /kernel: rt_pfe_veto: Memory usage of M_RTNEXTHOP type = (0) Max size possible for M_RTNEXTHOP type = (8311787520) Current delayed unref = (60000), Current unique delayed unref = (10896), Max delayed unref on this platform = (40000) Current delayed weight unref = (71426) Max delayed weight unref on this platform= (400000) curproc = rpd Oct 11 04:56:00 2020 test /kernel: rt_pfe_veto: Too many delayed route/nexthop unrefs. Op 2 err 55, rtsm_id 5:-1, msg type 2 This issue only affects PTX Series devices. No other products or platforms are affected by this vulnerability. This issue affects Juniper Networks Junos OS on PTX Series: 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S8, 18.4R3-S7; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.2R1.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-ptx5000ptx10003ptx3000ptx10016ptx10001-36mrjunosptx10002ptx10008ptx10004ptx1000Junos OS
CWE ID-CWE-19
Not Available
CVE-2021-0244
Matching Score-8
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-8
Assigner-Juniper Networks, Inc.
CVSS Score-7.4||HIGH
EPSS-0.21% / 43.20%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 19:37
Updated-16 Sep, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: A race condition in the storm control profile may allow an attacker to cause a Denial of Service condition

A signal handler race condition exists in the Layer 2 Address Learning Daemon (L2ALD) of Juniper Networks Junos OS due to the absence of a specific protection mechanism to avoid a race condition which may allow an attacker to bypass the storm-control feature on devices. This issue is a corner case and only occurs during specific actions taken by an administrator of a device under certain specifics actions which triggers the event. The event occurs less frequently on devices which are not configured with Virtual Chassis configurations, and more frequently on devices configured in Virtual Chassis configurations. This issue is not specific to any particular Junos OS platform. An Indicator of Compromise (IoC) may be seen by reviewing log files for the following error message seen by executing the following show statement: show log messages | grep storm Result to look for: /kernel: GENCFG: op 58 (Storm Control Blob) failed; err 1 (Unknown) This issue affects: Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D49 on EX Series; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D191, 15.1X49-D200 on SRX Series; 16.1 versions prior to 16.1R7-S7; 16.2 versions prior to 16.2R2-S11, 16.2R3; 17.1 versions prior to 17.1R2-S11, 17.1R3; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S5; 18.2 versions prior to 18.2R2-S6, 18.2R3; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R1-S5, 18.4R2; 19.1 versions prior to 19.1R1-S4, 19.1R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-ex4400srx345srx5800srx380srx4200srx340ex9200srx4100ex4300ex3400ex9250ex2300srx5400ex4650srx550srx300ex4600srx320srx5600junosex2300-csrx4600srx1500Junos OS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
  • Previous
  • 1
  • 2
  • Next
Details not found