7.5

CVE-2017-10610

On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This issue only occurs if NAT64 is configured. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D71, 12.3X48 prior to 12.3X48-D55, 15.1X49 prior to 15.1X49-D100 on SRX Series. No other Juniper Networks products or platforms are affected by this issue.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version12.1x46
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated10
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated15
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated20
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated25
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated30
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated35
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated40
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated45
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated50
   JuniperSrx Series Version-
JuniperJunos Version12.1x46 Updated55
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated10
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated15
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated20
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated25
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated30
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated35
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated40
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated45
   JuniperSrx Series Version-
JuniperJunos Version12.3x48 Updated50
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated10
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated20
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated30
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated35
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated40
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated45
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated50
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated55
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated60
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated65
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated70
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated75
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated80
   JuniperSrx Series Version-
JuniperJunos Version15.1x49 Updated90
   JuniperSrx Series Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.37% 0.557
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
sirt@juniper.net 7.5 3.9 3.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.