445
VMScore

CVE-2019-0005

Published: 15/01/2019 Updated: 09/11/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

On EX2300, EX3400, EX4600, QFX3K and QFX5K series, firewall filter configuration cannot perform packet matching on any IPv6 extension headers. This issue may allow IPv6 packets that should have been blocked to be forwarded. IPv4 packet filtering is unaffected by this vulnerability. Affected releases are Juniper Networks Junos OS on EX and QFX series;: 14.1X53 versions before 14.1X53-D47; 15.1 versions before 15.1R7; 15.1X53 versions before 15.1X53-D234 on QFX5200/QFX5110 series; 15.1X53 versions before 15.1X53-D591 on EX2300/EX3400 series; 16.1 versions before 16.1R7; 17.1 versions before 17.1R2-S10, 17.1R3; 17.2 versions before 17.2R3; 17.3 versions before 17.3R3; 17.4 versions before 17.4R2; 18.1 versions before 18.1R2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 14.1x53

juniper junos 15.1

juniper junos 15.1x53

juniper junos 16.1

juniper junos 17.1

juniper junos 17.2

juniper junos 17.3

juniper junos 17.4

juniper junos 18.1