3.3
CVSSv2

CVE-2020-1633

Published: 09/04/2020 Updated: 22/11/2021
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 294
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, leading to a Denial of Service (DoS) condition. This issue only affects Junos OS 17.4 and later releases. Prior releases do not support this feature and are unaffected by this vulnerability. This issue only affects IPv6. IPv4 ARP proxy is unaffected by this vulnerability. This issue affects Juniper Networks Junos OS: 17.4 versions before 17.4R2-S9, 17.4R3 on MX Series; 18.1 versions before 18.1R3-S9 on MX Series; 18.2 versions before 18.2R2-S7, 18.2R3-S3 on MX Series; 18.2X75 versions before 18.2X75-D33, 18.2X75-D411, 18.2X75-D420, 18.2X75-D60 on MX Series; 18.3 versions before 18.3R1-S7, 18.3R2-S3, 18.3R3 on MX Series; 18.4 versions before 18.4R1-S5, 18.4R2-S2, 18.4R3 on MX Series; 19.1 versions before 19.1R1-S4, 19.1R2 on MX Series; 19.2 versions before 19.2R1-S3, 19.2R2 on MX Series.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 17.4

juniper junos 18.1

juniper junos 18.2

juniper junos 18.2x75

juniper junos 18.3

juniper junos 18.4

juniper junos 19.1

juniper junos 19.2