// For flags

CVE-2019-0064

Junos OS: SRX5000 Series: flowd process crash due to receipt of specific TCP packet

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.

En los dispositivos de la Serie SRX5000, si se configura "set security zones security-zone (zone) tcp-rst", el proceso flowd puede bloquearse cuando un paquete TCP específico es recibido por el dispositivo y desencadena una nueva sesión. El proceso se reinicia automáticamente. Sin embargo, la recepción de un flujo constante de estos paquetes TCP puede resultar en una condición de Denegación de Servicio (DoS) extendida en el dispositivo. Este problema afecta a Juniper Networks Junos OS: versión 18.2R3 en la serie SRX 5000; versión 18.4R2 en la serie SRX 5000; versión 19.2R1 en la serie SRX 5000.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-10-11 CVE Reserved
  • 2019-10-09 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA10963 2021-07-21
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2
Search vendor "Juniper" for product "Junos" and version "18.2"
r3
Affected
in Juniper
Search vendor "Juniper"
Srx5400
Search vendor "Juniper" for product "Srx5400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2
Search vendor "Juniper" for product "Junos" and version "18.2"
r3
Affected
in Juniper
Search vendor "Juniper"
Srx5600
Search vendor "Juniper" for product "Srx5600"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2
Search vendor "Juniper" for product "Junos" and version "18.2"
r3
Affected
in Juniper
Search vendor "Juniper"
Srx5800
Search vendor "Juniper" for product "Srx5800"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.4
Search vendor "Juniper" for product "Junos" and version "18.4"
r2
Affected
in Juniper
Search vendor "Juniper"
Srx5400
Search vendor "Juniper" for product "Srx5400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.4
Search vendor "Juniper" for product "Junos" and version "18.4"
r2
Affected
in Juniper
Search vendor "Juniper"
Srx5600
Search vendor "Juniper" for product "Srx5600"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.4
Search vendor "Juniper" for product "Junos" and version "18.4"
r2
Affected
in Juniper
Search vendor "Juniper"
Srx5800
Search vendor "Juniper" for product "Srx5800"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.2
Search vendor "Juniper" for product "Junos" and version "19.2"
r1
Affected
in Juniper
Search vendor "Juniper"
Srx5400
Search vendor "Juniper" for product "Srx5400"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.2
Search vendor "Juniper" for product "Junos" and version "19.2"
r1
Affected
in Juniper
Search vendor "Juniper"
Srx5600
Search vendor "Juniper" for product "Srx5600"
--
Safe
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.2
Search vendor "Juniper" for product "Junos" and version "19.2"
r1
Affected
in Juniper
Search vendor "Juniper"
Srx5800
Search vendor "Juniper" for product "Srx5800"
--
Safe