CVE-2020-1671Improper Restriction of Operations within the Bounds of a Memory Buffer in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 39.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateDec 30

Description

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, resulting with the restart of the daemon. This issue only affects DHCPv6, it does not affect DHCPv4. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5juniper_networks/junos_os17.417.4R2-S12, 17.4R3-S3+10
NVDjuniper/junos11 versions+10
Linuxlinux/linux_kernel5.13.05.15.121+2

🔴Vulnerability Details

3
OSV
MIPS: KVM: Fix NULL pointer dereference2025-12-30
GHSA
GHSA-cx8w-wg7g-8xjv: On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol D2022-05-24
CVEList
Junos OS: Receipt of malformed DHCPv6 packets causes jdhcpd to crash.2020-10-16

📋Vendor Advisories

1
Juniper
CVE-2020-1671: On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol D2020-10-16
CVE-2020-1671 — Juniper Networks Junos OS vulnerability | cvebase