Vulnerability Name:

CVE-2017-2304 (CCN-120547)

Assigned:2016-12-01
Published:2017-01-11
Updated:2019-05-10
Summary:Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak'
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.1 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2017-2304

Source: CCN
Type: SECTRACK ID: 1037593
Juniper Junos Ethernet Frame Padding Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System

Source: BID
Type: Third Party Advisory, VDB Entry
95403

Source: CCN
Type: BID-95403
Multiple Juniper Products Ethernet Packet CVE-2017-2304 Information Disclosure Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1037593

Source: XF
Type: UNKNOWN
juniper-junos-cve20172304-info-disc(120547)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10773
QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600: 'Etherleak' memory disclosure in Ethernet padding data (CVE-2017-2304)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA10773

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:14.1x53:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d10:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d15:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d16:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d25:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d26:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d27:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d30:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:14.1x53:d35:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:d20:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:d21:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:d25:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:d30:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:d32:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:d33:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:d34:*:*:*:*:*:*
  • AND
  • cpe:/h:juniper:ex4300:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:ex4600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx3500:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx3600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5200:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:juniper:qfx3500:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx3600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5200:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:ex4600:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos 14.1x53 -
    juniper junos 14.1x53 d10
    juniper junos 14.1x53 d15
    juniper junos 14.1x53 d16
    juniper junos 14.1x53 d25
    juniper junos 14.1x53 d26
    juniper junos 14.1x53 d27
    juniper junos 14.1x53 d30
    juniper junos 14.1x53 d35
    juniper junos 15.1 -
    juniper junos 15.1 r1
    juniper junos 15.1x53 -
    juniper junos 15.1x53 d20
    juniper junos 15.1x53 d21
    juniper junos 15.1x53 d25
    juniper junos 15.1x53 d30
    juniper junos 15.1x53 d32
    juniper junos 15.1x53 d33
    juniper junos 15.1x53 d34
    juniper ex4300 -
    juniper ex4600 -
    juniper qfx3500 -
    juniper qfx3600 -
    juniper qfx5100 -
    juniper qfx5200 -
    juniper qfx3500 -
    juniper qfx3600 -
    juniper qfx5100 -
    juniper qfx5200 -
    juniper ex4600 -