| Summary | An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to the local segment, through a local segment broadcast, may be able to cause a Junos device to enter an improper boundary check condition allowing a memory corruption to occur, leading to a denial of service. Further crafted packets may be able to sustain the denial of service condition. Score: 6.5 MEDIUM (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Further, if the attacker is authenticated on the target device receiving and processing the malicious LLDP packet, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over the target device thereby elevating their permissions and privileges, and taking control of the device. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) An unauthenticated network-based attacker able to send a maliciously crafted LLDP packet to one or more local segments, via LLDP proxy / tunneling agents or other LLDP through Layer 3 deployments, through one or more local segment broadcasts, may be able to cause multiple Junos devices to enter an improper boundary check condition allowing a memory corruption to occur, leading to multiple distributed Denials of Services. These Denials of Services attacks may have cascading Denials of Services to adjacent connected devices, impacts network devices, servers, workstations, etc. Further crafted packets may be able to sustain these Denials of Services conditions. Score 6.8 MEDIUM (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) Further, if the attacker is authenticated on one or more target devices receiving and processing these malicious LLDP packets, while receiving the crafted packets, the attacker may be able to perform command or arbitrary code injection over multiple target devices thereby elevating their permissions and privileges, and taking control multiple devices. Score: 7.8 HIGH (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D71; 12.3 versions prior to 12.3R12-S7; 12.3X48 versions prior to 12.3X48-D55; 14.1 versions prior to 14.1R8-S5, 14.1R9; 14.1X53 versions prior to 14.1X53-D46, 14.1X53-D50, 14.1X53-D107; 14.2 versions prior to 14.2R7-S9, 14.2R8; 15.1 versions prior to 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7; 15.1X49 versions prior to 15.1X49-D90; 15.1X53 versions prior to 15.1X53-D65; 16.1 versions prior to 16.1R4-S6, 16.1R5; 16.1X65 versions prior to 16.1X65-D45; 16.2 versions prior to 16.2R2; 17.1 versions prior to 17.1R2. No other Juniper Networks products or platforms are affected by this issue. |
|---|---|
| Publication Date | Jan. 11, 2018, 7:29 a.m. |
| Registration Date | March 1, 2021, 6:35 p.m. |
| Last Update | Nov. 21, 2024, 12:37 p.m. |
| CVSS3.0 : CRITICAL | |
| スコア | 9.8 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : HIGH | |
| Score | 10.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.1x46:d60:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d50:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d65:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d55:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d50:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r8:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r9:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:* | |||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1x53:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:* | |||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:* | |||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:* | |||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:* | |||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:* | |||||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:* | |||||
| Configuration11 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:16.1x65:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1x65:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:16.1x65:d40:*:*:*:*:*:* | |||||
| Configuration12 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:* | |||||
| Configuration13 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:* | |||||
| Title | Juniper Networks Junos OS におけるコードインジェクションの脆弱性 |
|---|---|
| Summary | Juniper Networks Junos OS には、コードインジェクションの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Jan. 10, 2018, midnight |
| Registration Date | Feb. 21, 2018, 1:39 p.m. |
| Last Update | Feb. 21, 2018, 1:39 p.m. |
| ジュニパーネットワークス |
| Junos OS 12.1X46-D71 未満の 12.1X46 |
| Junos OS 12.3R12-S7 未満の 12.3 |
| Junos OS 12.3X48-D55 未満の 12.3X48 |
| Junos OS 14.1R8-S5 未満の 14.1 |
| Junos OS 14.1R9 |
| Junos OS 14.1X53-D107 |
| Junos OS 14.1X53-D46 未満の 14.1X53 |
| Junos OS 14.1X53-D50 |
| Junos OS 14.2R7-S9 未満の 14.2 |
| Junos OS 14.2R8 |
| Junos OS 15.1F2-S17 未満の 15.1 |
| Junos OS 15.1F5-S8 |
| Junos OS 15.1F6-S8 |
| Junos OS 15.1R5-S7 |
| Junos OS 15.1R7 |
| Junos OS 15.1X49-D90 未満の 15.1X49 |
| Junos OS 15.1X53-D65 未満の 15.1X53 |
| Junos OS 16.1R4-S6 未満の 16.1 |
| Junos OS 16.1R5 |
| Junos OS 16.1X65-D45 未満の 16.1X65 |
| Junos OS 16.2R2 未満の 16.2 |
| Junos OS 17.1R2 未満の 17.1 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年02月21日] 掲載 |
Feb. 21, 2018, 1:39 p.m. |