In MPLS environments, receipt of a specific SNMP packet may cause the routing protocol daemon (RPD) process to crash and restart. By continuously sending a specially crafted SNMP packet, an attacker can repetitively crash the RPD process causing prolonged denial of service. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS : 12.1X46 versions before 12.1X46-D77 on SRX Series; 12.3 versions before 12.3R12-S10; 12.3X48 versions before 12.3X48-D75 on SRX Series; 14.1X53 versions before 14.1X53-D48 on EX/QFX series; 15.1 versions before 15.1R4-S9, 15.1R7-S2; 15.1F6 versions before 15.1F6-S11; 15.1X49 versions before 15.1X49-D141, 15.1X49-D144, 15.1X49-D150 on SRX Series; 15.1X53 versions before 15.1X53-D234 on QFX5200/QFX5110 Series; 15.1X53 versions before 15.1X53-D68 on QFX10K Series; 15.1X53 versions before 15.1X53-D471, 15.1X53-D490 on NFX Series; 15.1X53 versions before 15.1X53-D590 on EX2300/EX3400 Series; 15.1X54 on ACX Series; 16.1 versions before 16.1R3-S10, 16.1R4-S11, 16.1R6-S5, 16.1R7; 16.1X65 versions before 16.1X65-D48; 16.2 versions before 16.2R2-S6; 17.1 versions before 17.1R2-S8, 17.1R3; 17.2 versions before 17.2R1-S7, 17.2R3; 17.2X75 versions before 17.2X75-D92, 17.2X75-D102, 17.2X75-D110; 17.3 versions before 17.3R3; 17.4 versions before 17.4R1-S4, 17.4R2; 18.1 versions before 18.1R1-S1, 18.1R2-S1, 18.1R3; 18.2X75 versions before 18.2X75-D10.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos 12.1x46 |
||
juniper junos 12.3 |
||
juniper junos 12.3x48 |
||
juniper junos 14.1x53 |
||
juniper junos 15.1 |
||
juniper junos 15.1x49 |
||
juniper junos 15.1x53 |
||
juniper junos 15.1x54 |
||
juniper junos 16.1 |
||
juniper junos 16.1x65 |
||
juniper junos 16.2 |
||
juniper junos 17.1 |
||
juniper junos 17.2 |
||
juniper junos 17.2x75 |
||
juniper junos 17.3 |
||
juniper junos 17.4 |
||
juniper junos 18.1 |
||
juniper junos 18.2x75 |