CVE-2020-1603Improper Adherence to Coding Standards in Networks Junos OS

Severity
8.6HIGHNVD
EPSS
0.6%
top 29.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Latest updateMay 24

Description

Specific IPv6 packets sent by clients processed by the Routing Engine (RE) are improperly handled. These IPv6 packets are designed to be blocked by the RE from egressing the RE. Instead, the RE allows these specific IPv6 packets to egress the RE, at which point a mbuf memory leak occurs within the Juniper Networks Junos OS device. This memory leak eventually leads to a kernel crash (vmcore), or the device hanging and requiring a power cycle to restore service, creating a Denial of Service (DoS)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0

Affected Packages2 packages

CVEListV5juniper_networks/junos_os16.116.1R7-S6+12
NVDjuniper/junos14 versions+13

🔴Vulnerability Details

2
GHSA
GHSA-4mj3-qm89-4qgh: Specific IPv6 packets sent by clients processed by the Routing Engine (RE) are improperly handled2022-05-24
CVEList
Junos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel crash (vmcore) the device.2020-01-15

📋Vendor Advisories

1
Juniper
CVE-2020-1603: Specific IPv6 packets sent by clients processed by the Routing Engine (RE) are improperly handled. These IPv6 packets are designed to be blocked by th2020-01-15
CVE-2020-1603 — Improper Adherence to Coding Standards | cvebase