Vulnerability Name: CVE-2017-2304 (CCN-120547) Assigned: 2016-12-01 Published: 2017-01-11 Updated: 2019-05-10 Summary: Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak' CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): NoneAvailibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N )5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): AdjacentAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
6.1 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:N/A:N )Exploitability Metrics: Access Vector (AV): Adjacent_NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-200 Vulnerability Consequences: Obtain Information References: Source: MITRE Type: CNACVE-2017-2304 Source: CCN Type: SECTRACK ID: 1037593Juniper Junos Ethernet Frame Padding Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System Source: BID Type: Third Party Advisory, VDB Entry95403 Source: CCN Type: BID-95403Multiple Juniper Products Ethernet Packet CVE-2017-2304 Information Disclosure Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry1037593 Source: XF Type: UNKNOWNjuniper-junos-cve20172304-info-disc(120547) Source: CCN Type: Juniper Networks Security Bulletin JSA10773QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600: 'Etherleak' memory disclosure in Ethernet padding data (CVE-2017-2304) Source: CONFIRM Type: Vendor Advisoryhttps://kb.juniper.net/JSA10773 Vulnerable Configuration: Configuration 1 :cpe:/o:juniper:junos:14.1x53:-:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d10:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d15:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d16:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d25:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d26:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d27:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d30:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d35:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:-:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:r1:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:-:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d20:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d21:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d25:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d30:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d32:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d33:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d34:*:*:*:*:*:* AND cpe:/h:juniper:ex4300:-:*:*:*:*:*:*:* OR cpe:/h:juniper:ex4600:-:*:*:*:*:*:*:* OR cpe:/h:juniper:qfx3500:-:*:*:*:*:*:*:* OR cpe:/h:juniper:qfx3600:-:*:*:*:*:*:*:* OR cpe:/h:juniper:qfx5100:-:*:*:*:*:*:*:* OR cpe:/h:juniper:qfx5200:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:juniper:qfx3500:-:*:*:*:*:*:*:* OR cpe:/h:juniper:qfx3600:-:*:*:*:*:*:*:* OR cpe:/h:juniper:qfx5100:-:*:*:*:*:*:*:* OR cpe:/h:juniper:qfx5200:-:*:*:*:*:*:*:* OR cpe:/h:juniper:ex4600:-:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
juniper junos 14.1x53 -
juniper junos 14.1x53 d10
juniper junos 14.1x53 d15
juniper junos 14.1x53 d16
juniper junos 14.1x53 d25
juniper junos 14.1x53 d26
juniper junos 14.1x53 d27
juniper junos 14.1x53 d30
juniper junos 14.1x53 d35
juniper junos 15.1 -
juniper junos 15.1 r1
juniper junos 15.1x53 -
juniper junos 15.1x53 d20
juniper junos 15.1x53 d21
juniper junos 15.1x53 d25
juniper junos 15.1x53 d30
juniper junos 15.1x53 d32
juniper junos 15.1x53 d33
juniper junos 15.1x53 d34
juniper ex4300 -
juniper ex4600 -
juniper qfx3500 -
juniper qfx3600 -
juniper qfx5100 -
juniper qfx5200 -
juniper qfx3500 -
juniper qfx3600 -
juniper qfx5100 -
juniper qfx5200 -
juniper ex4600 -