CVE-2020-1648
Junos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
On Juniper Networks Junos OS and Junos OS Evolved devices, processing a specific BGP packet can lead to a routing process daemon (RPD) crash and restart. This issue can occur even before the BGP session with the peer is established. Repeated receipt of this specific BGP packet can result in an extended Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later versions, prior to 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70; 19.4 versions 19.4R1 and 19.4R1-S1; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved: 19.4-EVO versions prior to 19.4R2-S2-EVO; 20.1-EVO versions prior to 20.1R2-EVO. This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.
En los dispositivos Juniper Networks Junos OS y Junos OS Evolved, el procesamiento de un paquete BGP específico puede provocar el bloqueo y reinicio del demonio de proceso de enrutamiento (RPD). Este problema puede ocurrir incluso antes de que se establezca la sesión de BGP con el par. La recepción repetida de este paquete BGP específico puede dar lugar a una condición de Denegación de Servicio (DoS) extendida. Este problema afecta: Juniper Networks Junos OS: Versiones 18.2X75 a partir de 18.2X75-D50.8, 18.2X75-D60 y versiones posteriores, anteriores a la versión 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1, 18.2X75-D70; versiones 19.4 19.4R1 y 19.4R1-S1; versiones 20.1 anteriores a la versión 20.1R1-S2, 20.1R2. Evolución del SO Junos de Juniper Networks: Versiones 19.4-EVO anteriores a la versión Este problema no afecta: Versiones del SO Junos de Juniper Networks anteriores a la 19.4R1. Versiones evolucionadas del SO Junos de Juniper Networks anteriores a la versión 19.4R1-EVO
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-11-04 CVE Reserved
- 2020-07-17 CVE Published
- 2023-04-02 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-159: Improper Handling of Invalid Use of Special Elements
- CWE-690: Unchecked Return Value to NULL Pointer Dereference
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 18.2x75 Search vendor "Juniper" for product "Junos" and version "18.2x75" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 18.2x75 Search vendor "Juniper" for product "Junos" and version "18.2x75" | - |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 18.2x75 Search vendor "Juniper" for product "Junos" and version "18.2x75" | d20 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 18.2x75 Search vendor "Juniper" for product "Junos" and version "18.2x75" | d30 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 18.2x75 Search vendor "Juniper" for product "Junos" and version "18.2x75" | d40 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 19.4 Search vendor "Juniper" for product "Junos" and version "19.4" | r1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 19.4 Search vendor "Juniper" for product "Junos" and version "19.4" | r1-s1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 20.1 Search vendor "Juniper" for product "Junos" and version "20.1" | r1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Search vendor "Juniper" for product "Junos" | 20.1 Search vendor "Juniper" for product "Junos" and version "20.1" | r1-s1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 19.4 Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4" | r1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 19.4 Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4" | r2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 19.4 Search vendor "Juniper" for product "Junos Os Evolved" and version "19.4" | r2-s1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 20.1 Search vendor "Juniper" for product "Junos Os Evolved" and version "20.1" | r1 |
Affected
|