Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2014-0613

CVE information

Published

10 years ago

Last Modified

10 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

The XNM command processor in Juniper Junos 10.4 before 10.4R16, 11.4 before 11.4R10, 12.1R before 12.1R8-S2, 12.1X44 before 12.1X44-D30, 12.1X45 before 12.1X45-D20, 12.1X46 before 12.1X46-D10, 12.2 before 12.2R7, 12.3 before 12.3R5, 13.1 before 13.1R3-S1, 13.2 before 13.2R2-S2, and 13.3 before 13.3R1, when xnm-ssl or xnm-clear-text is enabled, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors..

CVSSv2.0 Score

Severity
High
Base Score
7.1/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
6.9/10
Confidentiality Impact
None
Availability Impact
Complete
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:10.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1r:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*
  Yes
- -