// For flags

CVE-2020-1648

Junos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later versions, prior to 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70; 19.4 versions 19.4R1 and 19.4R1-S1; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: 19.4-EVO versions prior to 19.4R2-S2-EVO; 20.1-EVO versions prior to 20.1R2-EVO. This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.

En los dispositivos Juniper Networks Junos OS y Junos OS Evolved, el procesamiento de un paquete BGP específico puede provocar el bloqueo y reinicio del demonio de proceso de enrutamiento (RPD). Este problema puede ocurrir incluso antes de que se establezca la sesión de BGP con el par. La recepción repetida de este paquete BGP específico puede dar lugar a una condición de Denegación de Servicio (DoS) extendida. Este problema afecta: Juniper Networks Junos OS: Versiones 18.2X75 a partir de 18.2X75-D50.8, 18.2X75-D60 y versiones posteriores, anteriores a la versión 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70; versiones 19.4 19.4R1 y 19.4R1-S1; versiones 20.1 anteriores a la versión 20.1R1-S2, 20.1R2. Evolución del SO Junos de Juniper Networks: Versiones 19.4-EVO anteriores a la versión Este problema no afecta: Versiones del SO Junos de Juniper Networks anteriores a la 19.4R1. Versiones evolucionadas del SO Junos de Juniper Networks anteriores a la versión 19.4R1-EVO

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-11-04 CVE Reserved
  • 2020-07-17 CVE Published
  • 2023-04-02 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-159: Improper Handling of Invalid Use of Special Elements
  • CWE-690: Unchecked Return Value to NULL Pointer Dereference
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA11035 2022-01-01
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2x75
Search vendor "Juniper" for product "Junos" and version "18.2x75"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2x75
Search vendor "Juniper" for product "Junos" and version "18.2x75"
-
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2x75
Search vendor "Juniper" for product "Junos" and version "18.2x75"
d20
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2x75
Search vendor "Juniper" for product "Junos" and version "18.2x75"
d30
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
18.2x75
Search vendor "Juniper" for product "Junos" and version "18.2x75"
d40
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4"
r1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4"
r2
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
19.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4"
r2-s1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
20.1
Search vendor "Juniper" for product "Junos Os Evolved" and version "20.1"
r1
Affected