490
VMScore

CVE-2018-0057

Published: 10/10/2018 Updated: 09/10/2019
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 9.6 | Impact Score: 5.8 | Exploitability Score: 3.1
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P

Vulnerability Summary

On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions before 15.1R7-S2, 15.1R8; 16.1 versions before 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions before 16.2R2-S7, 16.2R3; 17.1 versions before 17.1R2-S9, 17.1R3; 17.2 versions before 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions before 17.3R2-S4, 17.3R3; 17.4 versions before 17.4R2; 18.1 versions before 18.1R2-S3, 18.1R3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 15.1

juniper junos 16.1

juniper junos 16.2

juniper junos 17.1

juniper junos 17.2

juniper junos 17.3

juniper junos 17.4

juniper junos 18.1