Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2019-0840 | A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D25 prior to 12.1X46-D71, 12.1X46-D73 on SRX Series; 12.3X48 versions prior to 12.3X48-D50 on SRX Series; 15.1X49 versions prior to 15.1X49-D75 on SRX Series. |
Solution
The following software releases have been updated to resolve this specific issue: 12.1X46-D71, 12.1X46-D73, 12.3X48-D50, 15.1X49-D75, 17.3R1, and all subsequent releases.
Workaround
Discontinue use of proxy ARP. An example configuration snippet is below: deactivate security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32 (or) delete security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32 There are no other viable workarounds for this issue.
No history.

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T01:11:20.764Z
Reserved: 2018-10-11T00:00:00
Link: CVE-2019-0033

No data.

Status : Modified
Published: 2019-04-10T20:29:00.583
Modified: 2024-11-21T04:16:05.597
Link: CVE-2019-0033

No data.

No data.