IPv6 sendd in Juniper Junos 12.1X44 prior to 12.1X44-D51, 12.1X46 prior to 12.1X46-D36, 12.1X46 prior to 12.1X46-D40, 12.1X47 prior to 12.1X47-D25, 12.3 prior to 12.3R10, 12.3X48 prior to 12.3X48-D20, 13.2 prior to 13.2R8, 13.3 prior to 13.3R6, 14.1 prior to 14.1R5, 14.2 prior to 14.2R3, 15.1 prior to 15.1R1, and 15.1X49 prior to 15.1X49-D20, when the "set protocols neighbor-discovery secure security-level default" option is configured, allows remote malicious users to cause a denial of service (CPU consumption) via a crafted Secure Neighbor Discovery (SEND) Protocol packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos 12.1x44 |
||
juniper junos 12.1x46 |
||
juniper junos 12.3 |
||
juniper junos 13.3 |
||
juniper junos 12.1x47 |
||
juniper junos 12.3x48 |
||
juniper junos 13.2 |
||
juniper junos 14.1 |
||
juniper junos 14.2 |
||
juniper junos 15.1 |
||
juniper junos 14.1x53 |
||
juniper junos 15.1x49 |