CVE-2018-0026Networks Junos OS vulnerability

4 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.8%
top 26.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Latest updateMay 13

Description

After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it does not show the applied firewall filter. The correct output should show the applied firewall filter, for example: user@re0> show interfaces extensive | match filters" CAM destination filters: 0, CAM source

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5juniper_networks/junos_os15.1X815.1X8.3+1
NVDjuniper/junos15.1, 15.1x8+1

🔴Vulnerability Details

1
GHSA
GHSA-4438-62q8-6hf2: After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect2022-05-13

📋Vendor Advisories

1
Juniper
CVE-2018-0026: After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the co2018-07-11
CVE-2018-0026 — Juniper Networks Junos OS vulnerability | cvebase