CVE-2020-1667Race Condition in Networks Junos OS

CWE-362Race Condition5 documents5 sources
Severity
8.3HIGHNVD
EPSS
0.3%
top 45.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process might be bypassed due to a race condition. Due to this vulnerability, mspmand process, responsible for managing "URL Filtering service", can crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DN

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.7

Affected Packages2 packages

CVEListV5juniper_networks/junos_os17.317.3R3-S8+5
NVDjuniper/junos6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-752f-63g3-9w4c: When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of pack2022-05-24
CVEList
Junos OS: MX Series: Services card might restart due to a race condition when DNS filtering is enabled.2020-10-16

📋Vendor Advisories

1
Juniper
CVE-2020-1667: When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of pack2020-10-16

🕵️Threat Intelligence

1
Huntress
What Is a Race Condition? Types, Causes & Security Impact | Huntress
CVE-2020-1667 — Race Condition in Networks Junos OS | cvebase