Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-12548 | On Juniper Networks Junos OS devices, receipt of a malformed IPv6 packet may cause the system to crash and restart (vmcore). This issue can be trigged by a malformed IPv6 packet destined to the Routing Engine. An attacker can repeatedly send the offending packet resulting in an extended Denial of Service condition. Only IPv6 packets can trigger this issue. IPv4 packets cannot trigger this issue. This issue affects Juniper Networks Junos OS 18.4 versions prior to 18.4R2-S4, 18.4R3-S1; 19.1 versions prior to 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2. This issue does not affect Juniper Networks Junos OS prior to 18.4R1. |
Solution
The following software releases have been updated to resolve this specific issue: Junos OS 18.4R2-S4, 18.4R3-S1, 19.1R2-S1, 19.1R3, 19.2R1-S5, 19.2R2, 19.3R2-S4, 19.3R3, 19.4R1-S3, 19.4R2, 19.4R2-S1, 20.1R1, and all subsequent releases.
Workaround
Standard security best common practices such as limiting packet toward the RE only from trusted networks/host using firewall filter in combination with source address anti-spoofing should be applied to reduce the risk of exposure.
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11083 |
|
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T16:52:42.618Z
Reserved: 2019-11-04T00:00:00
Link: CVE-2020-1686
No data.
Status : Modified
Published: 2020-10-16T21:15:14.257
Modified: 2024-11-21T05:11:09.830
Link: CVE-2020-1686
No data.
OpenCVE Enrichment
No data.
EUVD