CVE-2020-1648Improper Handling of Invalid Use of Special Elements in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 39.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 17
Latest updateMay 24

Description

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later versions, prior to 18.2X75-D52.8, 18.2X75-D53,

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved20.1-EVO20.1R2-EVO
CVEListV5juniper_networks/junos_os18.2X75-D50.8 18.2X75-D6018.2X75*+1
NVDjuniper/junos_os_evolved19.4, 20.1+1
NVDjuniper/junos18.2x75, 19.4, 20.1+2

🔴Vulnerability Details

2
GHSA
GHSA-52x8-4mc9-26r2: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and resta2022-05-24
CVEList
Junos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet2020-07-17

📋Vendor Advisories

1
Juniper
CVE-2020-1648: On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and resta2020-07-17
CVE-2020-1648 — Juniper Networks Junos OS vulnerability | cvebase