CVE-2018-0060Improper Input Validation in Networks Junos OS

Severity
5.9MEDIUMNVD
EPSS
0.2%
top 57.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10
Latest updateMay 13

Description

An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. Junos devices are not vulnerable to this issue when not configured to use DHCP. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D40 on SRX Series; 12.3X48 versions prior to 12.3X48-D20 on S

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages5 packages

CVEListV5juniper_networks/junos_os12.1X4612.1X46-D40+8
NVDjuniper/junos6 versions+5

🔴Vulnerability Details

1
GHSA
GHSA-687m-cccm-2jgw: An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of2022-05-13

📋Vendor Advisories

1
Juniper
CVE-2018-0060: An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of2018-10-10
CVE-2018-0060 — Improper Input Validation | cvebase