CVE-2020-1686Double Free in Networks Junos OS

CWE-415Double Free4 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.4%
top 41.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged by a malformed IPv6 packet destined to the Routing Engine. An attacker can repeatedly send the offending packet resulting in an extended Denial of Service condition. Only IPv6 packets can trigger this issue. IPv4 packets cannot trigger this issue. This issue affects Juniper Networks Junos OS 18.4 versions prior to 18.4R2-S4, 18.4R3-S1; 19.1 versio

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os18.418.4R2-S4, 18.4R3-S1+4
NVDjuniper/junos5 versions+4

🔴Vulnerability Details

2
GHSA
GHSA-2j3x-ghj2-35fv: On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore)2022-05-24
CVEList
Junos OS: Kernel crash (vmcore) upon receipt of a malformed IPv6 packet.2020-10-16

📋Vendor Advisories

1
Juniper
CVE-2020-1686: On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged2020-10-16
CVE-2020-1686 — Double Free in Networks Junos OS | cvebase