445
VMScore

CVE-2020-1680

Published: 16/10/2020 Updated: 05/02/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

On Juniper Networks MX Series with MS-MIC or MS-MPC card configured with NAT64 configuration, receipt of a malformed IPv6 packet may crash the MS-PIC component on MS-MIC or MS-MPC. This issue occurs when a multiservice card is translating the malformed IPv6 packet to IPv4 packet. An unauthenticated attacker can continuously send crafted IPv6 packets through the device causing repetitive MS-PIC process crashes, resulting in an extended Denial of Service condition. This issue affects Juniper Networks Junos OS on MX Series: 15.1 versions before 15.1R7-S7; 15.1X53 versions before 15.1X53-D593; 16.1 versions before 16.1R7-S8; 17.2 versions before 17.2R3-S4; 17.3 versions before 17.3R3-S6; 17.4 versions before 17.4R2-S11, 17.4R3; 18.1 versions before 18.1R3-S11; 18.2 versions before 18.2R3-S6; 18.2X75 versions before 18.2X75-D41, 18.2X75-D430, 18.2X75-D53, 18.2X75-D65; 18.3 versions before 18.3R2-S4, 18.3R3; 18.4 versions before 18.4R2-S5, 18.4R3; 19.1 versions before 19.1R2; 19.2 versions before 19.2R1-S5, 19.2R2; 19.3 versions before 19.3R2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 15.1

juniper junos 15.1x53

juniper junos 16.1

juniper junos 17.2

juniper junos 17.3

juniper junos 17.4

juniper junos 18.1

juniper junos 18.2

juniper junos 18.2x75

juniper junos 18.3

juniper junos 18.4

juniper junos 19.1

juniper junos 19.2

juniper junos 19.3