CVE-2020-1627Improper Input Validation in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 39.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the riot forwarding daemon to crash. By continuously sending the same specific packets, an attacker can repeatedly crash the riot process causing a sustained Denial of Service. Flow cache is specific to vMX based products and the MX150, and is enabled by defaul

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os18.118.1R3+5
NVDjuniper/junos6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-fg22-5jgq-2wm6: A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific pac2022-05-24
CVEList
Junos OS: vMX and MX150: Denial of Service vulnerability in packet processing2020-04-08

📋Vendor Advisories

1
Juniper
CVE-2020-1627: A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific pac2020-04-08

💬Community

1
Bugzilla
CVE-2020-24330 trousers: fails to drop the root gid privilege when no longer needed2020-08-19
CVE-2020-1627 — Improper Input Validation | cvebase