CVE-2019-0064Improper Input Validation in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 39.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9
Latest updateMay 24

Description

On SRX5000 Series devices, if 'set security zones security-zone tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os18.2R3, 18.4R2, 19.2R1+2
NVDjuniper/junos18.2, 18.4, 19.2+2

🔴Vulnerability Details

2
GHSA
GHSA-6vpf-6mrv-x8cr: On SRX5000 Series devices, if 'set security zones security-zone tcp-rst' is configured, the flowd process may crash when a specific TCP packet is rece2022-05-24
CVEList
Junos OS: SRX5000 Series: flowd process crash due to receipt of specific TCP packet2019-10-09

📋Vendor Advisories

1
Juniper
CVE-2019-0064: On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the flowd process may crash when a specific TCP packet2019-10-09
CVE-2019-0064 — Improper Input Validation | cvebase