CVE-2018-0032Improper Input Validation in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.5%
top 32.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Latest updateMay 13

Description

The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specific versions of Junos OS listed within this advisory. Earlier releases are unaffected by this vulnerability. This crafted BGP UPDATE does not propagate to other BGP peers. Affected releases are Juniper Networks Junos OS: 16.1X65 versions prior to 16.1

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5juniper_networks/junos_os16.1X6516.1X65-D47+3
NVDjuniper/junos4 versions+3

🔴Vulnerability Details

1
GHSA
GHSA-44r6-wp57-342h: The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart2022-05-13

📋Vendor Advisories

1
Juniper
CVE-2018-0032: The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can2018-07-11
CVE-2018-0032 — Improper Input Validation | cvebase