Juniper Junos IPv6 Neighbor Discovery (ND) Traffic Handling Multiple Vulnerabilities (JSA10749)

Medium Nessus Plugin ID 91762


The remote device is affected by multiple vulnerabilities.


According to its self-reported version number, the remote Juniper Junos device is affected by multiple vulnerabilities :

- A flaw exists due to improper handling of malformed IPv6 ND packets. An unauthenticated, remote attacker can exploit this, via specially crafted ND packets, to cause the device to stop processing IPv6 traffic, resulting in a denial of service condition. (VulnDB 139535)

- A flaw exists that is triggered when handling QFX5100 exceptions. An unauthenticated, remote attacker can exploit this to transition IPv6 ND traffic to the routing engine, resulting in a partial denial of service condition. (VulnDB 139536)

- An unspecified flaw exists that allows an unauthenticated, remote attacker to cause improper forwarding of IPv6 ND traffic in violation of RFC4861.
(VulnDB 139537)

Note that Nessus has not tested for these issues but has instead relied only on the device's self-reported model and current configuration.


Apply the relevant Junos software release referenced in Juniper advisory JSA10749.

See Also

Plugin Details

Severity: Medium

ID: 91762

File Name: juniper_jsa10749.nasl

Version: 1.4

Type: combined

Published: 2016/06/22

Modified: 2017/10/19

Dependencies: 55932

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P


Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/model, Host/Juniper/JUNOS/Version

Patch Publication Date: 2017/04/18

Vulnerability Publication Date: 2016/06/03

Reference Information

CVE: CVE-2016-1409

OSVDB: 139535, 139536, 139537

JSA: JSA10749