Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2019-0067

CVE information

Published

4 years ago

Last Modified

2 years ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

Medium

Impact Analysis

Description

Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions..

CVSSv2.0 Score

Severity
Medium
Base Score
6.1/10
Exploit Score
6.5/10
Access Vector
Adjacent_network
Access Complexity
Low
Authentication Required
None
Impact Score
6.9/10
Confidentiality Impact
None
Availability Impact
Complete
Integrity Impact
None

CVSSv3.1 Score

Severity
Medium
Base Score
6.5/10
Exploit Score
2.8/10
Access Vector
Adjacent_network
Access Complexity
Low
Privileges Required
None
Impact Score
3.6/10
Confidentiality Impact
None
Availability Impact
High
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:-:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:16.2:r2-s9:*:*:*:*:*:*
  Yes
- -