9.8

CVE-2018-0016

Receipt of a specially crafted Connectionless Network Protocol (CLNP) datagram destined to an interface of a Junos OS device may result in a kernel crash or lead to remote code execution. Devices are only vulnerable to the specially crafted CLNP datagram if 'clns-routing' or ES-IS is explicitly configured. Devices with without CLNS enabled are not vulnerable to this issue. Devices with IS-IS configured on the interface are not vulnerable to this issue unless CLNS routing is also enabled. This issue only affects devices running Junos OS 15.1. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5-S3, 15.1F6-S8, 15.1F7, 15.1R5; 15.1X49 versions prior to 15.1X49-D60; 15.1X53 versions prior to 15.1X53-D66, 15.1X53-D233, 15.1X53-D471. Earlier releases are unaffected by this vulnerability, and the issue has been resolved in Junos OS 16.1R1 and all subsequent releases.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version15.1
   JuniperJunos Version-
JuniperJunos Version15.1 Updater1
   JuniperJunos Version-
JuniperJunos Version15.1 Updater2
   JuniperJunos Version-
JuniperJunos Version15.1 Updater3
   JuniperJunos Version-
JuniperJunos Version15.1 Updater4
   JuniperJunos Version-
JuniperJunos Version15.1f
   JuniperJunos Version-
JuniperJunos Version15.1f2
   JuniperJunos Version-
JuniperJunos Version15.1f3
   JuniperJunos Version-
JuniperJunos Version15.1f4
   JuniperJunos Version-
JuniperJunos Version15.1f5
   JuniperJunos Version-
JuniperJunos Version15.1f5 Updates1
   JuniperJunos Version-
JuniperJunos Version15.1f6 Updates1
   JuniperJunos Version-
JuniperJunos Version15.1f6 Updates2
   JuniperJunos Version-
JuniperJunos Version15.1x49
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated10
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated20
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated30
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated35
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated40
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated45
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated50
   JuniperJunos Version-
JuniperJunos Version15.1x49 Updated55
   JuniperJunos Version-
JuniperJunos Version15.1x53
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated10
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated20
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated21
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated30
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated32
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated33
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated34
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated50
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated51
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated52
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated55
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated57
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated58
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated60
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated61
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated62
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated63
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated64
   JuniperJunos Version-
JuniperJunos Version15.1x53 Updated65
   JuniperJunos Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 15.17% 0.943
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 8.5 6.8 10
AV:N/AC:M/Au:S/C:C/I:C/A:C
sirt@juniper.net 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H