CVE-2019-0067Improper Input Validation in Networks Junos OS

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 77.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9
Latest updateMay 24

Description

Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5juniper_networks/junos_os16.116.1R6-S2, 16.1R7+2
NVDjuniper/junos16.1, 16.2, 17.1+2

🔴Vulnerability Details

1
GHSA
GHSA-j6jw-rjg4-7274: Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore)2022-05-24

📋Vendor Advisories

1
Juniper
CVE-2019-0067: Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a speciall2019-10-09
CVE-2019-0067 — Improper Input Validation | cvebase