7.5
CVSSv3

CVE-2020-1657

Published: 16/10/2020 Updated: 27/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an malicious user to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of these spoofed packets can cause a sustained Denial of Service (DoS) condition. This issue affects IPv4 and IPv6 implementations. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions before 12.3X48-D90; 15.1X49 versions before 15.1X49-D190; 17.4 versions before 17.4R2-S9, 17.4R3; 18.1 versions before 18.1R3-S9; 18.2 versions before 18.2R3; 18.3 versions before 18.3R1-S7, 18.3R2-S3, 18.3R3; 18.4 versions before 18.4R1-S6, 18.4R2-S3, 18.4R3; 19.1 versions before 19.1R1-S4, 19.1R2. This issue does not affect 12.3 or 15.1 releases which are non-SRX Series releases.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 12.3x48

juniper junos 15.1x49

juniper junos 17.4

juniper junos 18.1

juniper junos 18.2

juniper junos 18.3

juniper junos 18.4

juniper junos 19.1