CVE-2020-1646Improper Handling of Invalid Use of Special Elements in Networks Junos OS Evolved

Severity
7.5HIGHNVD
EPSS
0.4%
top 39.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 17
Latest updateMay 24

Description

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) crash and restart. This issue occurs only when the device is receiving and processing the BGP UPDATE for an EBGP peer. This issue does not occur when the device is receiving and processing the BGP UPDATE for an IBGP peer. However, the offending BGP UPDATE can originally come from an EBGP peer, propagates through the network via IBGP peers without cau

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified19.3R1-EVO+1
CVEListV5juniper_networks/junos_os17.3R3-S6, 17.4R2-S7, 18.1R3-S7+2
NVDjuniper/junos17.3, 17.4, 18.1+2

🔴Vulnerability Details

2
GHSA
GHSA-3vf8-2x93-3hff: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) cr2022-05-24
CVEList
Junos OS and Junos OS Evolved: RPD crash while processing a specific BGP update information.2020-07-17

📋Vendor Advisories

1
Juniper
CVE-2020-1646: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific UPDATE for an EBGP peer can lead to a routing process daemon (RPD) cr2020-07-17
CVE-2020-1646 — Networks Junos OS Evolved vulnerability | cvebase