Juniper Junos IPv6 Neighbor Discovery (ND) Traffic Handling Multiple Vulnerabilities (JSA10749)

medium Nessus Plugin ID 91762


The remote device is affected by multiple vulnerabilities.


According to its self-reported version number, the remote Juniper Junos device is affected by multiple vulnerabilities :

- A flaw exists due to improper handling of malformed IPv6 ND packets. An unauthenticated, remote attacker can exploit this, via specially crafted ND packets, to cause the device to stop processing IPv6 traffic, resulting in a denial of service condition.

- A flaw exists that is triggered when handling QFX5100 exceptions. An unauthenticated, remote attacker can exploit this to transition IPv6 ND traffic to the routing engine, resulting in a partial denial of service condition.

- An unspecified flaw exists that allows an unauthenticated, remote attacker to cause improper forwarding of IPv6 ND traffic in violation of RFC4861.

Note that Nessus has not tested for these issues but has instead relied only on the device's self-reported model and current configuration.


Apply the relevant Junos software release referenced in Juniper advisory JSA10749.

See Also

Plugin Details

Severity: Medium

ID: 91762

File Name: juniper_jsa10749.nasl

Version: 1.8

Type: combined

Published: 6/22/2016

Updated: 1/2/2019

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P


Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Patch Publication Date: 4/18/2017

Vulnerability Publication Date: 6/3/2016

Reference Information

CVE: CVE-2016-1409

JSA: JSA10749