CVE-2013-6015Improper Input Validation in Juniper Junos

Severity
4.3MEDIUMNVD
EPSS
0.7%
top 28.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 17
Latest updateMay 17

Description

Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series services gateways, when a plugin using TCP proxy is configured, allows remote attackers to cause a denial of service (flow daemon crash) via an unspecified sequence of TCP packets.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

NVDjuniper/junos10.4+40

🔴Vulnerability Details

1
GHSA
GHSA-22r5-h494-2vm4: Juniper Junos before 102022-05-17

📋Vendor Advisories

1
Juniper
CVE-2013-6015: Juniper Junos before 10.4S14, 11.4 before 11.4R5-S2, 12.1R before 12.1R3, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D15 on SRX Series ser2013-10-17