7.5

CVE-2020-1634

On High-End SRX Series devices, in specific configurations and when specific networking events or operator actions occur, an SPC receiving genuine multicast traffic may core. Subsequently, all FPCs in a chassis may reset causing a Denial of Service. This issue affects both IPv4 and IPv6. This issue affects: Juniper Networks Junos OS 12.3X48 version 12.3X48-D80 and later versions prior to 12.3X48-D95 on High-End SRX Series. This issue does not affect Branch SRX Series devices.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version12.3x48 Update-
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated10
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated15
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated20
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated25
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated30
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated35
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated40
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated45
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated50
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated51
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated55
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated60
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated65
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated70
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated75
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
JuniperJunos Version12.3x48 Updated80
   JuniperSrx1500 Version-
   JuniperSrx300 Version-
   JuniperSrx4100 Version-
   JuniperSrx4200 Version-
   JuniperSrx4600 Version-
   JuniperSrx5400 Version-
   JuniperSrx550 Version-
   JuniperSrx5600 Version-
   JuniperSrx5800 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.54% 0.665
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
sirt@juniper.net 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-190 Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.