Vulnerability identifier: #VU54991
Vulnerability risk: High
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Juniper Junos OS
Operating systems & Components /
Operating system
Vendor: Juniper Networks, Inc.
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing a specific BGP UPDATE on Juniper Networks Junos OS devices with Multipath or add-path feature enabled. A remote attacker can send specific BGP UPDATE message and crash the routing process daemon (RPD).
This BGP UPDATE message can propagate to other BGP peers with vulnerable Junos versions on which Multipath or add-path feature is enabled, and cause RPD to crash and restart. This issue affects both IBGP and EBGP deployments in IPv4 or IPv6 network.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Juniper Junos OS: 12.3 - 12.3R12-S17, 17.4 - 17.4R3-S3, 17.4R2-S9, 18.2 - 18.2R3-S6, 17.3 - 17.3R3-S10, 15.1 - 15.1R7-S8, 15.1F - 15.1F7-S2, 18.1 - 18.1R3-S11, 18.3 - 18.3R3-S3, 18.3R2-S3, 18.3R3-S1, 19.1 - 19.1R3-S2, 19.1R1-S4, 18.4 - 18.4R3-S5, 18.4R1-S5, 18.4R2-S3, 19.2
External links
http://kb.juniper.net/JSA11186
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.