8.8
CVSSv3

CVE-2020-1656

Published: 16/10/2020 Updated: 05/02/2021
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The DHCPv6 Relay-Agent service, part of the Juniper Enhanced jdhcpd daemon shipped with Juniper Networks Junos OS has an Improper Input Validation vulnerability which will result in a Denial of Service (DoS) condition when a DHCPv6 client sends a specific DHPCv6 message allowing an malicious user to potentially perform a Remote Code Execution (RCE) attack on the target device. Continuous receipt of the specific DHCPv6 client message will result in an extended Denial of Service (DoS) condition. If adjacent devices are also configured to relay DHCP packets, and are not affected by this issue and simply transparently forward unprocessed client DHCPv6 messages, then the attack vector can be a Network-based attack, instead of an Adjacent-device attack. No other DHCP services are affected. Receipt of the packet without configuration of the DHCPv6 Relay-Agent service, will not result in exploitability of this issue. This issue affects Juniper Networks Junos OS: 12.3 versions before 12.3R12-S15; 12.3X48 versions before 12.3X48-D95; 14.1X53 versions before 14.1X53-D53; 15.1 versions before 15.1R7-S6; 15.1X49 versions before 15.1X49-D200; 15.1X53 versions before 15.1X53-D593; 16.1 versions before 16.1R7-S7; 16.2 versions before 16.2R2-S11; 17.1 versions before 17.1R2-S11, 17.1R3-S2; 17.2 versions before 17.2R3-S3; 17.2X75 versions before 17.2X75-D44; 17.3 versions before 17.3R3-S7; 17.4 versions before 17.4R2-S9, 17.4R3; 18.1 versions before 18.1R3-S9; 18.2 versions before 18.2R2-S6, 18.2R3-S2; 18.2X75 versions before 18.2X75-D12, 18.2X75-D33, 18.2X75-D435, 18.2X75-D60; 18.3 versions before 18.3R1-S7, 18.3R2-S3, 18.3R3-S1; 18.4 versions before 18.4R1-S5, 18.4R2-S3, 18.4R3; 19.1 versions before 19.1R1-S4, 19.1R2; 19.2 versions before 19.2R1-S3, 19.2R2; 19.3 versions before 19.3R2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 12.3

juniper junos 12.3x48

juniper junos 14.1x53

juniper junos 15.1

juniper junos 15.1x49

juniper junos 15.1x53

juniper junos 16.1

juniper junos 16.2

juniper junos 17.1

juniper junos 17.2

juniper junos 17.2x75

juniper junos 17.3

juniper junos 17.4

juniper junos 18.1

juniper junos 18.2

juniper junos 18.2x75

juniper junos 18.3

juniper junos 18.4

juniper junos 19.1

juniper junos 19.2

juniper junos 19.3