| Summary | An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. Junos devices are not vulnerable to this issue when not configured to use DHCP. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D40 on SRX Series; 12.3X48 versions prior to 12.3X48-D20 on SRX Series; 14.1X53 versions prior to 14.1X53-D40 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 15.1X49 versions prior to 15.1X49-D20 on SRX Series; 15.1X53 versions prior to 15.1X53-D68 on QFX10000 Series; 15.1X53 versions prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions prior to 15.1X53-D495 on NFX150, NFX250; 15.1X53 versions prior to 15.1X53-D590 on EX2300/EX3400; 15.1 versions prior to 15.1R7-S2. |
|---|---|
| Publication Date | Oct. 11, 2018, 3:29 a.m. |
| Registration Date | March 1, 2021, 6:35 p.m. |
| Last Update | Nov. 21, 2024, 12:37 p.m. |
| CVSS3.0 : MEDIUM | |
| スコア | 5.9 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 4.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:N/I:N/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:* | |||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d57:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d51:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d52:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d55:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d58:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d62:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d63:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d64:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d61:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d50:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d65:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d66:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:15.1x53:d490:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:nfx_series:-:*:*:*:*:*:*:* | ||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:14.1x53:d15:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d35:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d30:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d25:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d27:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d16:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:14.1x53:d26:*:*:*:*:*:* | |||||
| execution environment | |||||
| 1 | cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:* | ||||
| 2 | cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:* | ||||
| 3 | cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:* | ||||
| 4 | cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:* | ||||
| 5 | cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:* | ||||
| 6 | cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:* | ||||
| 7 | cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:* | ||||
| 8 | cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:* | ||||
| Title | Juniper Networks Junos OS における入力確認に関する脆弱性 |
|---|---|
| Summary | Juniper Networks Junos OS には、入力確認に関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 10, 2018, midnight |
| Registration Date | Feb. 28, 2019, 4:46 p.m. |
| Last Update | Feb. 28, 2019, 4:46 p.m. |
| ジュニパーネットワークス |
| Junos OS |
| Junos OS |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2019年02月28日] 掲載 |
Feb. 28, 2019, 4:46 p.m. |