Vulnerability Name:

CVE-2015-7748 (CCN-107423)

Assigned:2015-10-15
Published:2015-10-15
Updated:2017-10-06
Summary:Juniper chassis with Trio (Trinity) chipset line cards and Junos OS 13.3 before 13.3R8, 14.1 before 14.1R6, 14.2 before 14.2R5, and 15.1 before 15.1R2 allow remote attackers to cause a denial of service (MPC line card crash) via a crafted uBFD packet.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2015-7748

Source: CONFIRM
Type: Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10701

Source: CCN
Type: Juniper Networks Security Bulletin JSA10701
Junos: Trio Chipset (Trinity) Denial of service due to maliciously crafted uBFD packet. (CVE-2015-7748)

Source: BID
Type: UNKNOWN
101103

Source: CCN
Type: BID-101103
Juniper Junos CVE-2015-7748 Denial of Service Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1033858

Source: XF
Type: UNKNOWN
juniper-junos-cve20157748-dos(107423)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:13.3:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r2-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r3:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r4:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r5:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r6:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.3:r7:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1:r3:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1:r4:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1:r5:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.2:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.2:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.2:r3:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.2:r4:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1:r1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:12.1x44:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos 13.3
    juniper junos 13.3 r1
    juniper junos 13.3 r2
    juniper junos 13.3 r2-s2
    juniper junos 13.3 r3
    juniper junos 13.3 r4
    juniper junos 13.3 r5
    juniper junos 13.3 r6
    juniper junos 13.3 r7
    juniper junos 14.1
    juniper junos 14.1 r1
    juniper junos 14.1 r2
    juniper junos 14.1 r3
    juniper junos 14.1 r4
    juniper junos 14.1 r5
    juniper junos 14.2 r1
    juniper junos 14.2 r2
    juniper junos 14.2 r3
    juniper junos 14.2 r4
    juniper junos 15.1
    juniper junos 15.1 r1
    juniper junos 12.1x44 -