Juniper Junos for M/MX Series Routers IPv6 Neighbor Discovery DoS (JSA10786)

Low Nessus Plugin ID 99527


The remote device is affected by a denial of service vulnerability.


According to its self-reported version and configuration, the remote Juniper Junos M/MX Series device is affected by a denial of service vulnerability in a Packet Forwarding Engine (PFE) when processing IPv6 neighbor discovery (ND) packets that originate from subscribers and are destined to M/MX series routers that are configured with Enhanced Subscriber Management for DHCPv6 subscribers. An unauthenticated, adjacent attacker can exploit this to cause the PFE to hang or crash.
Note that this issue only affects devices whose system configuration contains 'subscriber-management enable force'. Furthermore, devices with only IPv4 configured are not affected.

Nessus has not tested for this issue but has instead relied only on the device's self-reported version and current configuration.


Apply the relevant Junos software release or workaround referenced in Juniper advisory JSA10786.

See Also

Plugin Details

Severity: Low

ID: 99527

File Name: juniper_jsa10786.nasl

Version: 1.5

Type: combined

Published: 2017/04/20

Updated: 2018/08/10

Dependencies: 55932

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 3.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 4.3

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version, Host/Juniper/model, Settings/ParanoidReport

Patch Publication Date: 2017/04/12

Vulnerability Publication Date: 2017/04/12

Reference Information

CVE: CVE-2017-2340

BID: 97607

JSA: JSA10786