A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D25 prior to 12.1X46-D71, 12.1X46-D73 on SRX Series; 12.3X48 versions prior to 12.3X48-D50 on SRX Series; 15.1X49 versions prior to 15.1X49-D75 on SRX Series.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-0840 A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D25 prior to 12.1X46-D71, 12.1X46-D73 on SRX Series; 12.3X48 versions prior to 12.3X48-D50 on SRX Series; 15.1X49 versions prior to 15.1X49-D75 on SRX Series.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: 12.1X46-D71, 12.1X46-D73, 12.3X48-D50, 15.1X49-D75, 17.3R1, and all subsequent releases.


Workaround

Discontinue use of proxy ARP. An example configuration snippet is below: deactivate security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32 (or) delete security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32 There are no other viable workarounds for this issue.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-09-17T01:11:20.764Z

Reserved: 2018-10-11T00:00:00

Link: CVE-2019-0033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-10T20:29:00.583

Modified: 2024-11-21T04:16:05.597

Link: CVE-2019-0033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.