CVE-2014-6382Improper Input Validation in Juniper Junos

Severity
7.1HIGHNVD
EPSS
0.5%
top 35.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 16
Latest updateMay 17

Description

The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete.

CVSS vector

AV:N/AC:M/C:N/I:N/A:CExploitability: 8.6 | Impact: 6.9

Affected Packages3 packages

NVDjuniper/junos13.3, 14.1, 14.2+2

🔴Vulnerability Details

1
GHSA
GHSA-wqxr-4f7p-r7mg: The Juniper MX Series routers with Junos 132022-05-17

📋Vendor Advisories

1
Juniper
CVE-2014-6382: The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2,2015-01-16