Juniper Junos Packet Forwarding Engine Potential RCE (JSA10906)

Critical Nessus Plugin ID 121066


The remote device is missing a vendor-supplied security patch.


According to its self-reported version number, the remote Junos device is affected by a potential remote code execution vulnerability due to how the Packet Forwarding Engine manager (FXPC) handles HTTP packets.
An attacker could potentially crash the fxpc daemon or execute code.


Apply the relevant Junos software release referenced in Juniper advisory JSA10906.

See Also

Plugin Details

Severity: Critical

ID: 121066

File Name: juniper_jsa10906.nasl

Version: 1.3

Type: combined

Published: 2019/01/10

Updated: 2019/04/18

Dependencies: 55932

Risk Information

Risk Factor: Critical

CVSS Score Source: CVE-2019-0006

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version, Host/Juniper/model

Patch Publication Date: 2019/01/09

Vulnerability Publication Date: 2019/01/09

Reference Information

CVE: CVE-2019-0006

JSA: JSA10906