// For flags

CVE-2017-10619

Junos: SRX cluster denial of service vulnerability in flowd due to multicast packets

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled by default and is only supported in high-end SRX platforms. Affected releases are Juniper Networks Junos OS 12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80 on SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800.

Cuando Express Path (antes conocido como "service offloading") se configura en Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 en modo de configuración de clústeres en alta disponibilidad, algunos paquetes multicast podrían causar que el proceso flowd se cierre de manera inesperada, deteniendo o interrumpiendo el trafico que atraviesa el dispositivo y desencadenando un fail-over RG1+ (data-plane) en el nodo secundario. El cierre inesperado de manera repetida del proceso flowd puede resultar en una condición extendida de denegación de servicio (DoS). Este servicio no está habilitado por defecto y solo es compatible en plataformas SRX de gama alta. Las distribuciones afectadas son: Juniper Networks Junos OS 12.3X48 anteriores a 12.3X48-D45, 15.1X49 anteriores a 15.1X49-D80 en SRX1400, SRX3400, SRX3600, SRX5400, SRX5600 y SRX5800.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-06-28 CVE Reserved
  • 2017-10-13 CVE Published
  • 2024-06-23 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA10821 2019-10-09
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.3x48
Search vendor "Juniper" for product "Junos" and version "12.3x48"
-
Affected
in Juniper
Search vendor "Juniper"
Srx1400
Search vendor "Juniper" for product "Srx1400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.3x48
Search vendor "Juniper" for product "Junos" and version "12.3x48"
-
Affected
in Juniper
Search vendor "Juniper"
Srx3400
Search vendor "Juniper" for product "Srx3400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.3x48
Search vendor "Juniper" for product "Junos" and version "12.3x48"
-
Affected
in Juniper
Search vendor "Juniper"
Srx3600
Search vendor "Juniper" for product "Srx3600"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.3x48
Search vendor "Juniper" for product "Junos" and version "12.3x48"
-
Affected
in Juniper
Search vendor "Juniper"
Srx5400
Search vendor "Juniper" for product "Srx5400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.3x48
Search vendor "Juniper" for product "Junos" and version "12.3x48"
-
Affected
in Juniper
Search vendor "Juniper"
Srx5600
Search vendor "Juniper" for product "Srx5600"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
12.3x48
Search vendor "Juniper" for product "Junos" and version "12.3x48"
-
Affected
in Juniper
Search vendor "Juniper"
Srx5800
Search vendor "Juniper" for product "Srx5800"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
15.1x49
Search vendor "Juniper" for product "Junos" and version "15.1x49"
-
Affected
in Juniper
Search vendor "Juniper"
Srx1400
Search vendor "Juniper" for product "Srx1400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
15.1x49
Search vendor "Juniper" for product "Junos" and version "15.1x49"
-
Affected
in Juniper
Search vendor "Juniper"
Srx3400
Search vendor "Juniper" for product "Srx3400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
15.1x49
Search vendor "Juniper" for product "Junos" and version "15.1x49"
-
Affected
in Juniper
Search vendor "Juniper"
Srx3600
Search vendor "Juniper" for product "Srx3600"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
15.1x49
Search vendor "Juniper" for product "Junos" and version "15.1x49"
-
Affected
in Juniper
Search vendor "Juniper"
Srx5400
Search vendor "Juniper" for product "Srx5400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
15.1x49
Search vendor "Juniper" for product "Junos" and version "15.1x49"
-
Affected
in Juniper
Search vendor "Juniper"
Srx5600
Search vendor "Juniper" for product "Srx5600"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
15.1x49
Search vendor "Juniper" for product "Junos" and version "15.1x49"
-
Affected
in Juniper
Search vendor "Juniper"
Srx5800
Search vendor "Juniper" for product "Srx5800"
--
Safe