6.5

CVE-2018-0055

Receipt of a specially crafted DHCPv6 message destined to a Junos OS device configured as a DHCP server in a Broadband Edge (BBE) environment may result in a jdhcpd daemon crash. The daemon automatically restarts without intervention, but a continuous receipt of crafted DHCPv6 packets could leaded to an extended denial of service condition. This issue only affects Junos OS 15.1 and later. Earlier releases are unaffected by this issue. Devices are only vulnerable to the specially crafted DHCPv6 message if DHCP services are configured. Devices not configured to act as a DHCP server are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D160; 15.1X53 versions prior to 15.1X53-D235, 15.1X53-D495; 16.1 versions prior to 16.1R4-S11, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9; 17.2 versions prior to 17.2R2-S6; 17.3 versions prior to 17.3R3-S1; 17.4 versions prior to 17.4R1-S5; 18.1 versions prior to 18.1R2-S3; 18.2 versions prior to 18.2R1-S2; 18.2X75 versions prior to 18.2X75-D20.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version15.1
JuniperJunos Version15.1 Updatef2
JuniperJunos Version15.1 Updatef3
JuniperJunos Version15.1 Updatef4
JuniperJunos Version15.1 Updatef5
JuniperJunos Version15.1 Updatef6
JuniperJunos Version15.1 Updatef7
JuniperJunos Version15.1 Updater1
JuniperJunos Version15.1 Updater2
JuniperJunos Version15.1 Updater3
JuniperJunos Version15.1 Updater6
JuniperJunos Version15.1x49
JuniperJunos Version15.1x49 Updated10
JuniperJunos Version15.1x49 Updated100
JuniperJunos Version15.1x49 Updated110
JuniperJunos Version15.1x49 Updated120
JuniperJunos Version15.1x49 Updated140
JuniperJunos Version15.1x49 Updated20
JuniperJunos Version15.1x49 Updated30
JuniperJunos Version15.1x49 Updated35
JuniperJunos Version15.1x49 Updated40
JuniperJunos Version15.1x49 Updated45
JuniperJunos Version15.1x49 Updated50
JuniperJunos Version15.1x49 Updated55
JuniperJunos Version15.1x49 Updated60
JuniperJunos Version15.1x49 Updated65
JuniperJunos Version15.1x49 Updated70
JuniperJunos Version15.1x49 Updated75
JuniperJunos Version15.1x49 Updated80
JuniperJunos Version15.1x49 Updated90
JuniperJunos Version15.1x53
JuniperJunos Version15.1x53 Updated10
JuniperJunos Version15.1x53 Updated20
JuniperJunos Version15.1x53 Updated21
JuniperJunos Version15.1x53 Updated210
JuniperJunos Version15.1x53 Updated230
JuniperJunos Version15.1x53 Updated231
JuniperJunos Version15.1x53 Updated232
JuniperJunos Version15.1x53 Updated233
JuniperJunos Version15.1x53 Updated30
JuniperJunos Version15.1x53 Updated32
JuniperJunos Version15.1x53 Updated33
JuniperJunos Version15.1x53 Updated34
JuniperJunos Version15.1x53 Updated40
JuniperJunos Version15.1x53 Updated45
JuniperJunos Version15.1x53 Updated50
JuniperJunos Version15.1x53 Updated51
JuniperJunos Version15.1x53 Updated52
JuniperJunos Version15.1x53 Updated55
JuniperJunos Version15.1x53 Updated57
JuniperJunos Version15.1x53 Updated58
JuniperJunos Version15.1x53 Updated59
JuniperJunos Version15.1x53 Updated60
JuniperJunos Version15.1x53 Updated62
JuniperJunos Version15.1x53 Updated63
JuniperJunos Version15.1x53 Updated64
JuniperJunos Version15.1x53 Updated65
JuniperJunos Version15.1x53 Updated66
JuniperJunos Version15.1x53 Updated67
JuniperJunos Version16.1
JuniperJunos Version16.1 Updater1
JuniperJunos Version16.1 Updater2
JuniperJunos Version16.1 Updater3
JuniperJunos Version16.2
JuniperJunos Version16.2 Updater1
JuniperJunos Version17.1
JuniperJunos Version17.1 Updater1
JuniperJunos Version17.2
JuniperJunos Version17.2 Updater1
JuniperJunos Version17.3
JuniperJunos Version17.3 Updater1
JuniperJunos Version17.3 Updater2
JuniperJunos Version17.4
JuniperJunos Version18.2x75
JuniperJunos Version18.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.445
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.3 1.6 3.6
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 2.9 5.5 2.9
AV:A/AC:M/Au:N/C:N/I:N/A:P
sirt@juniper.net 6.5 2.8 3.6
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.