CVE-2020-1668Uncontrolled Resource Consumption in Networks Junos OS

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 58.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead to traffic interruption. This issue occurs when multicast packets are received by the layer 2 interface. To check if the device has high CPU load due to this issue, the administrator can issue the following command: user@host> show chassis routing-engine Routing Engine status: ... Idle 2 percent the "Idle" value shows as low (2 % in the example ab

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os18.118.1R3-S11+8
NVDjuniper/junos9 versions+8

🔴Vulnerability Details

2
GHSA
GHSA-mgw6-w847-57fr: On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead2022-05-24
CVEList
Junos OS: EX2300 Series: High CPU load due to receipt of specific multicast packets on layer 2 interface2020-10-16

📋Vendor Advisories

1
Juniper
CVE-2020-1668: On Juniper Networks EX2300 Series, receipt of a stream of specific multicast packets by the layer2 interface can cause high CPU load, which could lead2020-10-16

💬Community

1
Bugzilla
CVE-2020-2139 jenkins-cobertura-plugin: arbitrary file write vulnerability2020-03-31
CVE-2020-1668 — Uncontrolled Resource Consumption | cvebase