CVE-2018-0045Improper Input Validation in Networks Junos OS

Severity
8.8HIGHNVD
EPSS
0.7%
top 28.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10
Latest updateMay 13

Description

Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for Draft-Rosen multicast virtual private network (MVPN). The VPN is multicast-enabled and configured to use Pro

CVSS vector

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5juniper_networks/junos_os12.1X4612.1X46-D77+16
NVDjuniper/junos13 versions+12

🔴Vulnerability Details

1
GHSA
GHSA-8mxq-g586-8g78: Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote c2022-05-13

💥Exploits & PoCs

1
Exploit-DB
Microsoft Edge Chakra JIT - Parameter Scope Parsing Type Confusion2018-08-17

📋Vendor Advisories

1
Juniper
CVE-2018-0045: Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote c2018-10-10
CVE-2018-0045 — Improper Input Validation | cvebase