8.5
CVSSv2

CVE-2018-0016

Published: 11/04/2018 Updated: 09/10/2019
CVSS v2 Base Score: 8.5 | Impact Score: 10 | Exploitability Score: 6.8
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 756
Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP datagram if 'clns-routing' or ES-IS is explicitly configured. Devices with without CLNS enabled are not vulnerable to this issue. Devices with IS-IS configured on the interface are not vulnerable to this issue unless CLNS routing is also enabled. This issue only affects devices running Junos OS 15.1. Affected releases are Juniper Networks Junos OS: 15.1 versions before 15.1F5-S3, 15.1F6-S8, 15.1F7, 15.1R5; 15.1X49 versions before 15.1X49-D60; 15.1X53 versions before 15.1X53-D66, 15.1X53-D233, 15.1X53-D471. Earlier releases are unaffected by this vulnerability, and the issue has been resolved in Junos OS 16.1R1 and all subsequent releases.

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 15.1

juniper junos 15.1x49

juniper junos 15.1x53

juniper junos 15.1f2

juniper junos 15.1f6

juniper junos 15.1f3

juniper junos 15.1f4

juniper junos 15.1f5

juniper junos 15.1f