CVE-2017-2348

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP service is interrupted. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D12, 14.1X53-D38, 14.1X53-D40 on QFX, EX, QFabric System; 15.1 prior to 15.1F2-S18, 15.1R4 on all products and platforms; 15.1X49 prior to 15.1X49-D80 on SRX; 15.1X53 prior to 15.1X53-D51, 15.1X53-D60 on NFX, QFX, EX.

References

http://www.securitytracker.com/id/1038899

https://kb.juniper.net/JSA10800

Details

Source: MITRE

Published: 2017-07-17

Updated: 2019-10-09

Type: CWE-400

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:juniper:junos:14.1x53:*:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:14.1x53:d10:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:14.1x53:d38:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:14.1x53:d40:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d10:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d20:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d21:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d25:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d32:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d33:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d34:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d47:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d48:*:*:*:*:*:*

cpe:2.3:o:juniper:junos:15.1x53:d60:*:*:*:*:*:*

Tenable Plugins

View all (1 total)

IDNameProductFamilySeverity
102075Juniper Junos jdhcpd IPv6 UDP DoS (JSA10800)NessusJunos Local Security Checks
high