// For flags

CVE-2014-3819

 

Severity Score

7.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Juniper Junos 11.4 before 11.4R12, 12.1 before 12.1R10, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R8, 12.3 before 12.3R7, 13.1 before 13.1R4, 13.2 before 13.2R4, 13.3 before 13.3R2, and 14.1 before 14.1R1, when Auto-RP is enabled, allows remote attackers to cause a denial of service (RDP routing process crash and restart) via a malformed PIM packet.

Juniper Junos 11.4 anterior a 11.4R12, 12.1 anterior a 12.1R10, 12.1X44 anterior a 12.1X44-D35, 12.1X45 anterior a 12.1X45-D25, 12.1X46 anterior a 12.1X46-D20, 12.1X47 anterior a 12.1X47-D10, 12.2 anterior a 12.2R8, 12.3 anterior a 12.3R7, 13.1 anterior a 13.1R4, 13.2 anterior a 13.2R4, 13.3 anterior a 13.3R2 y 14.1 anterior a 14.1R1, cuando Auto-RP está habilitado, permite a atacantes remotos causar una denegación de servicio (caída del proceso de enrutamiento RDP y reinicio) a través de un paquete PIM malformado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-05-21 CVE Reserved
  • 2014-07-11 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
11.4
Search vendor "Juniper" for product "Junos" and version "11.4"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.1
Search vendor "Juniper" for product "Junos" and version "12.1"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.1x44
Search vendor "Juniper" for product "Junos" and version "12.1x44"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.1x45
Search vendor "Juniper" for product "Junos" and version "12.1x45"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.1x46
Search vendor "Juniper" for product "Junos" and version "12.1x46"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.1x47
Search vendor "Juniper" for product "Junos" and version "12.1x47"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.2
Search vendor "Juniper" for product "Junos" and version "12.2"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.3
Search vendor "Juniper" for product "Junos" and version "12.3"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
13.1
Search vendor "Juniper" for product "Junos" and version "13.1"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
13.2
Search vendor "Juniper" for product "Junos" and version "13.2"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
13.3
Search vendor "Juniper" for product "Junos" and version "13.3"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
14.1
Search vendor "Juniper" for product "Junos" and version "14.1"
-
Affected