CVE-2020-1626Uncontrolled Resource Consumption in Networks Junos OS Evolved

Severity
7.5HIGHNVD
EPSS
0.5%
top 35.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resulting in a pfemand process crash. The pfemand process is responsible for packet forwarding on the device. By continuously sending the packet flood, an attacker can repeatedly crash the pfemand process causing a sustained Denial of Service. This issue can only be triggered by traffic sent to the device. Transit traffic does not

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified19.1R1-EVO

🔴Vulnerability Details

2
GHSA
GHSA-5pv5-vwqw-425f: A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packe2022-05-24
CVEList
Junos OS Evolved: Denial of Service vulnerability in processing high rate of specific packets2020-04-08

💥Exploits & PoCs

1
Exploit-DB
IcoFX 2.6 - '.ico' Buffer Overflow SEH + DEP Bypass using JOP2021-06-07

📋Vendor Advisories

1
Juniper
CVE-2020-1626: A vulnerability in Juniper Networks Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packe2020-04-08
CVE-2020-1626 — Uncontrolled Resource Consumption | cvebase