Vulnerability Name:

CVE-2019-0008 (CCN-159420)

Assigned:2018-10-11
Published:2019-04-10
Updated:2021-10-25
Summary:A certain sequence of valid BGP or IPv6 BFD packets may trigger a stack based buffer overflow in the Junos OS Packet Forwarding Engine manager (FXPC) process on QFX5000 series, EX4300, EX4600 devices. This issue can result in a crash of the fxpc daemon or may potentially lead to remote code execution. Affected releases are Juniper Networks Junos OS on QFX 5000 series, EX4300, EX4600 are: 14.1X53; 15.1X53 versions prior to 15.1X53-D235; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3; 17.3 versions prior to 17.3R3-S2, 17.3R4; 17.4 versions prior to 17.4R2-S1, 17.4R3; 18.1 versions prior to 18.1R3-S1, 18.1R4; 18.2 versions prior to 18.2R2; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-0008

Source: BID
Type: Third Party Advisory, VDB Entry
107897

Source: XF
Type: UNKNOWN
juniper-cve20190008-bo(159420)

Source: CCN
Type: Juniper Networks Security Bulletin JSA10930
QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding Engine manager (FXPC) process (CVE-2019-0008)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA10930

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.2 and < 18.2r2)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.1 and < 18.1r3-s1)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.4 and < 17.4r2-s1)
  • OR cpe:/o:juniper:junos:17.4:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:18.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.3 and < 18.3r2)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 18.2x75 and < 18.2x75-d30)
  • OR cpe:/o:juniper:junos:14.1x53:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.3:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.1 and < 17.1r3)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 15.1x53 and < 15.1x53-d235)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.3 and < 17.3r3-s2)
  • OR cpe:/o:juniper:junos:*:*:*:*:*:*:*:* (Version >= 17.2 and < 17.2r3)
  • AND
  • cpe:/h:juniper:qfx5120:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5200-48y:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:ex4300m:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5110:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:ex4650:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:ex4300:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5100:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:ex4600:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5200-32c:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:qfx5210-64c:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos:14.1x53:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.2:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.3:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:15.1x53:*:*:*:*:*:*:*
  • OR cpe:/a:juniper:junos:18.1:-:*:*:*:*:*:*
  • OR cpe:/a:juniper:junos:18.2:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:17.4:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos *
    juniper junos *
    juniper junos *
    juniper junos 17.4
    juniper junos 18.1
    juniper junos *
    juniper junos *
    juniper junos 14.1x53
    juniper junos 17.3
    juniper junos *
    juniper junos *
    juniper junos *
    juniper junos *
    juniper qfx5120 -
    juniper qfx5200-48y -
    juniper ex4300m -
    juniper qfx5110 -
    juniper ex4650 -
    juniper ex4300 -
    juniper qfx5100 -
    juniper ex4600 -
    juniper qfx5200-32c -
    juniper qfx5210-64c -
    juniper junos 14.1x53 -
    juniper junos 17.1 -
    juniper junos 17.2 -
    juniper junos 17.3 -
    juniper junos 15.1x53
    juniper junos 18.1 -
    juniper junos 18.2
    juniper junos 17.4 -