CVE-2017-10619Networks Junos OS vulnerability

4 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.4%
top 40.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 13
Latest updateMay 13

Description

When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is n

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80+1
NVDjuniper/junos12.3x48, 15.1x49+1

🔴Vulnerability Details

1
GHSA
GHSA-7x82-gf29-pfxv: When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in hig2022-05-13

💥Exploits & PoCs

1
Exploit-DB
RSLinx Classic and FactoryTalk Linx Gateway - Privilege Escalation2018-06-13

📋Vendor Advisories

1
Juniper
CVE-2017-10619: When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in hig2017-10-13
CVE-2017-10619 — Networks Junos OS vulnerability | cvebase