Vulnerability Name: CVE-2017-2348 (CCN-128492) Assigned: 2016-12-01 Published: 2017-07-13 Updated: 2019-10-09 Summary: The Juniper Enhanced jdhcpd daemon may experience high CPU utilization, or crash and restart upon receipt of an invalid IPv6 UDP packet. Both high CPU utilization and repeated crashes of the jdhcpd daemon can result in a denial of service as DHCP service is interrupted. No other Juniper Networks products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS 14.1X53 prior to 14.1X53-D12, 14.1X53-D38, 14.1X53-D40 on QFX, EX, QFabric System; 15.1 prior to 15.1F2-S18, 15.1R4 on all products and platforms; 15.1X49 prior to 15.1X49-D80 on SRX; 15.1X53 prior to 15.1X53-D51, 15.1X53-D60 on NFX, QFX, EX. CVSS v3 Severity: 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H )6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-400 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2017-2348 Source: SECTRACK Type: Third Party Advisory, VDB Entry1038899 Source: XF Type: UNKNOWNjuniper-cve20172348-dos(128492) Source: CCN Type: Juniper Networks Security Bulletin JSA10800Junos OS: jdhcpd daemon crash due to invalid IPv6 UDP packets (CVE-2017-2348) Source: CONFIRM Type: Vendor Advisoryhttps://kb.juniper.net/JSA10800 Vulnerable Configuration: Configuration 1 :cpe:/o:juniper:junos:14.1x53:-:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d10:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d38:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:d40:*:*:*:*:*:* Configuration 2 :cpe:/o:juniper:junos:15.1:*:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f1:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s1:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s2:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s3:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:f2-s4:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1:r4:*:*:*:*:*:* Configuration 3 :cpe:/o:juniper:junos:15.1x49:*:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d10:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d20:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d30:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d35:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d40:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d45:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d50:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d55:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d60:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d65:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d70:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:d75:*:*:*:*:*:* Configuration 4 :cpe:/o:juniper:junos:15.1x53:*:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d10:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d20:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d21:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d25:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d30:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d32:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d33:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d34:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d47:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d48:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:d60:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:juniper:junos:15.1:*:*:*:*:*:*:* OR cpe:/o:juniper:junos:14.1x53:-:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x53:*:*:*:*:*:*:* OR cpe:/o:juniper:junos:15.1x49:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
juniper junos 14.1x53
juniper junos 14.1x53 d10
juniper junos 14.1x53 d38
juniper junos 14.1x53 d40
juniper junos 15.1
juniper junos 15.1 f1
juniper junos 15.1 f2
juniper junos 15.1 f2-s1
juniper junos 15.1 f2-s2
juniper junos 15.1 f2-s3
juniper junos 15.1 f2-s4
juniper junos 15.1 r4
juniper junos 15.1x49
juniper junos 15.1x49 d10
juniper junos 15.1x49 d20
juniper junos 15.1x49 d30
juniper junos 15.1x49 d35
juniper junos 15.1x49 d40
juniper junos 15.1x49 d45
juniper junos 15.1x49 d50
juniper junos 15.1x49 d55
juniper junos 15.1x49 d60
juniper junos 15.1x49 d65
juniper junos 15.1x49 d70
juniper junos 15.1x49 d75
juniper junos 15.1x53
juniper junos 15.1x53 d10
juniper junos 15.1x53 d20
juniper junos 15.1x53 d21
juniper junos 15.1x53 d25
juniper junos 15.1x53 d30
juniper junos 15.1x53 d32
juniper junos 15.1x53 d33
juniper junos 15.1x53 d34
juniper junos 15.1x53 d47
juniper junos 15.1x53 d48
juniper junos 15.1x53 d60
juniper junos 15.1
juniper junos 14.1x53 -
juniper junos 15.1x53
juniper junos 15.1x49