7.5
CVSSv3

CVE-2016-4921

Published: 13/10/2017 Updated: 09/10/2019
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. Devices not configured to process IPv6 traffic are unaffected by this vulnerability. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. Affected releases are Juniper Networks Junos OS 11.4 before 11.4R13-S3; 12.3 before 12.3R3-S4; 12.3X48 before 12.3X48-D30; 13.3 before 13.3R10, 13.3R4-S11; 14.1 before 14.1R2-S8, 14.1R4-S12, 14.1R8; 14.1X53 before 14.1X53-D28, 14.1X53-D40; 14.1X55 before 14.1X55-D35; 14.2 before 14.2R3-S10, 14.2R4-S7, 14.2R6; 15.1 before 15.1F2-S5, 15.1F5-S2, 15.1F6, 15.1R3; 15.1X49 before 15.1X49-D40; 15.1X53 before 15.1X53-D57, 15.1X53-D70.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 11.4

juniper junos 11.4r13

juniper junos 12.3x48

juniper junos 12.3

juniper junos 13.3

juniper junos 14.1

juniper junos 14.1x53

juniper junos 14.1x55

juniper junos 14.2

juniper junos 15.1

juniper junos 15.1x53

juniper junos 15.1x49