CVE-2019-0066Unexpected Status Code or Return Value in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.5%
top 35.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9
Latest updateMay 24

Description

An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet i

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os15.115.1F6-S12, 15.1R7-S2+7
NVDjuniper/junos8 versions+7

🔴Vulnerability Details

1
GHSA
GHSA-52p2-4wq3-xf8g: An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to caus2022-05-24

📋Vendor Advisories

1
Juniper
CVE-2019-0066: An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to caus2019-10-09
CVE-2019-0066 — Unexpected Status Code or Return Value | cvebase