Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-0057 (GCVE-0-2018-0057)
Vulnerability from cvelistv5 – Published: 2018-10-10 18:00 – Updated: 2024-09-17 02:10- Information disclosure
- Denial of service
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS |
Affected:
15.1 , < 15.1R7-S2, 15.1R8
(custom)
Affected: 16.1 , < 16.1R4-S12, 16.1R7-S2, 16.1R8 (custom) Affected: 16.2 , < 16.2R2-S7, 16.2R3 (custom) Affected: 17.1 , < 17.1R2-S9, 17.1R3 (custom) Affected: 17.2 , < 17.2R1-S7, 17.2R2-S6, 17.2R3 (custom) Affected: 17.3 , < 17.3R2-S4, 17.3R3 (custom) Affected: 17.4 , < 17.4R2 (custom) Affected: 18.1 , < 18.1R2-S3, 18.1R3 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:14:16.658Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/JSA10892"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Junos OS",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "15.1R7-S2, 15.1R8",
"status": "affected",
"version": "15.1",
"versionType": "custom"
},
{
"lessThan": "16.1R4-S12, 16.1R7-S2, 16.1R8",
"status": "affected",
"version": "16.1",
"versionType": "custom"
},
{
"lessThan": "16.2R2-S7, 16.2R3",
"status": "affected",
"version": "16.2",
"versionType": "custom"
},
{
"lessThan": "17.1R2-S9, 17.1R3",
"status": "affected",
"version": "17.1",
"versionType": "custom"
},
{
"lessThan": "17.2R1-S7, 17.2R2-S6, 17.2R3",
"status": "affected",
"version": "17.2",
"versionType": "custom"
},
{
"lessThan": "17.3R2-S4, 17.3R3",
"status": "affected",
"version": "17.3",
"versionType": "custom"
},
{
"lessThan": "17.4R2",
"status": "affected",
"version": "17.4",
"versionType": "custom"
},
{
"lessThan": "18.1R2-S3, 18.1R3",
"status": "affected",
"version": "18.1",
"versionType": "custom"
}
]
}
],
"datePublic": "2018-10-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3."
}
],
"exploits": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information disclosure",
"lang": "en",
"type": "text"
}
]
},
{
"descriptions": [
{
"description": "Denial of service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T17:57:01",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/JSA10892"
}
],
"solutions": [
{
"lang": "en",
"value": "The following software releases have been updated to resolve this specific issue: 15.1R7-S2, 15.1R8, 16.1R4-S12, 16.1R7-S2, 16.1R8, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.3R2-S4, 17.3R3, 17.4R2, 18.1R2-S3, 18.1R3, 18.2R1, 18.3R1, and all subsequent releases."
}
],
"source": {
"advisory": "JSA10892",
"defect": [
"1351334"
],
"discovery": "USER"
},
"title": "Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in with Option 50 (Requested IP Address)",
"workarounds": [
{
"lang": "en",
"value": "There are no viable workarounds for this issue"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2018-10-10T16:00:00.000Z",
"ID": "CVE-2018-0057",
"STATE": "PUBLIC",
"TITLE": "Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in with Option 50 (Requested IP Address)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Junos OS",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "15.1",
"version_value": "15.1R7-S2, 15.1R8"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "16.1",
"version_value": "16.1R4-S12, 16.1R7-S2, 16.1R8"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "16.2",
"version_value": "16.2R2-S7, 16.2R3"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "17.1",
"version_value": "17.1R2-S9, 17.1R3"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "17.2",
"version_value": "17.2R1-S7, 17.2R2-S6, 17.2R3"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "17.3",
"version_value": "17.3R2-S4, 17.3R3"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "17.4",
"version_value": "17.4R2"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "18.1",
"version_value": "18.1R2-S3, 18.1R3"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3."
}
]
},
"exploit": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Denial of service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA10892",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10892"
}
]
},
"solution": [
{
"lang": "en",
"value": "The following software releases have been updated to resolve this specific issue: 15.1R7-S2, 15.1R8, 16.1R4-S12, 16.1R7-S2, 16.1R8, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.3R2-S4, 17.3R3, 17.4R2, 18.1R2-S3, 18.1R3, 18.2R1, 18.3R1, and all subsequent releases."
}
],
"source": {
"advisory": "JSA10892",
"defect": [
"1351334"
],
"discovery": "USER"
},
"work_around": [
{
"lang": "en",
"value": "There are no viable workarounds for this issue"
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2018-0057",
"datePublished": "2018-10-10T18:00:00Z",
"dateReserved": "2017-11-16T00:00:00",
"dateUpdated": "2024-09-17T02:10:54.305Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD0952C4-FFCC-4A78-ADFC-289BD6E269DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C56E6C3-BBB6-4853-91D9-99C7676D0CD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E0ECBD8-3D66-49DA-A557-5695159F0C06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EAA2998-A0D6-4818-9E7C-25E8099403E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*\", \"matchCriteriaId\": \"71D211B9-B2FE-4324-AAEE-8825D5238E48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E6CD065-EC06-4846-BD2A-D3CA7866070F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7620D01-1A6B-490F-857E-0D803E0AEE56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*\", \"matchCriteriaId\": \"08FC0245-A4FF-42C0-A236-8569301E351A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*\", \"matchCriteriaId\": \"120EA9E3-788B-4CFD-A74F-17111FFD0131\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AC40ABB-E364-46C9-A904-C0ED02806250\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBE35BDC-7739-4854-8BB8-E8600603DE9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2DC47132-9EEA-4518-8F86-5CD231FBFB61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD5A30CE-9498-4007-8E66-FD0CC6CF1836\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D571B57-4F4C-4232-9D3B-B2F7AAAB220B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3661BC68-6F32-447F-8D20-FD73FBBED9C6\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B47EC5-0276-4799-B536-12B33B5F003B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7572C187-4D58-4E0D-A605-B2B13EFF5C6B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64EB45C0-E3BD-4C0D-9E97-1DB726D66401\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F69A0E5-B61B-405D-B501-9CB306651CEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"38A40E03-F915-4888-87B0-5950F75F097D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"974B6128-ABD2-4D9C-87A1-5F1740DDCB95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"988D317A-0646-491F-9B97-853E8E208276\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBF736F6-ED05-4DC1-96FB-3F35BA5B3EFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A756E2-C320-405A-B24F-7C5022649E5A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3.\"}, {\"lang\": \"es\", \"value\": \"En las plataformas MX Series y M120/M320 configuradas en un entorno Broadband Edge (BBE), los suscriptores que inician sesi\\u00f3n con DHCP Option 50 para solicitar una direcci\\u00f3n IP espec\\u00edfica tendr\\u00e1n asignada la direcci\\u00f3n IP que soliciten, incluso aunque haya un enlace de MAC est\\u00e1tica a direcci\\u00f3n IP en el perfil de acceso. En el escenario de problemas, con una direcci\\u00f3n de hardware y una direcci\\u00f3n IP configurada bajo el grupo address-assignment, si un suscriptor inicia sesi\\u00f3n con DHCP Option 50, \\u00e9ste no recibir\\u00e1 una direcci\\u00f3n disponible del grupo de coincidencias, pero seguir\\u00e1 recibiendo la direcci\\u00f3n IP solicitada. Un suscriptor DHCP malicioso podr\\u00eda ser capaz de emplear esta vulnerabilidad para crear asignaciones de direcciones IP duplicadas, lo que conduce a una denegaci\\u00f3n de servicio (DoS) para los suscriptores v\\u00e1lidos o la divulgaci\\u00f3n de informaci\\u00f3n no autorizada mediante la suplantaci\\u00f3n de asignaciones de direcciones IP. Las versiones afectadas de Juniper Networks Junos OS son: 15.1 en versiones anteriores a la 15.1R7-S2, 15.1R8; 16.1 en versiones anteriores a la 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 en versiones anteriores a la 16.2R2-S7, 16.2R3; 17.1 en versiones anteriores a la 17.1R2-S9, 17.1R3; 17.2 en versiones anteriores a la 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 en versiones anteriores a la 17.3R2-S4, 17.3R3; 17.4 en versiones anteriores a la 17.4R2 y 18.1 en versiones anteriores a la 18.1R2-S3, 18.1R3.\"}]",
"id": "CVE-2018-0057",
"lastModified": "2024-11-21T03:37:28.720",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H\", \"baseScore\": 9.6, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.1, \"impactScore\": 5.8}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:N/A:P\", \"baseScore\": 5.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-10-10T18:29:02.983",
"references": "[{\"url\": \"https://kb.juniper.net/JSA10892\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://kb.juniper.net/JSA10892\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-0057\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2018-10-10T18:29:02.983\",\"lastModified\":\"2024-11-21T03:37:28.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3.\"},{\"lang\":\"es\",\"value\":\"En las plataformas MX Series y M120/M320 configuradas en un entorno Broadband Edge (BBE), los suscriptores que inician sesi\u00f3n con DHCP Option 50 para solicitar una direcci\u00f3n IP espec\u00edfica tendr\u00e1n asignada la direcci\u00f3n IP que soliciten, incluso aunque haya un enlace de MAC est\u00e1tica a direcci\u00f3n IP en el perfil de acceso. En el escenario de problemas, con una direcci\u00f3n de hardware y una direcci\u00f3n IP configurada bajo el grupo address-assignment, si un suscriptor inicia sesi\u00f3n con DHCP Option 50, \u00e9ste no recibir\u00e1 una direcci\u00f3n disponible del grupo de coincidencias, pero seguir\u00e1 recibiendo la direcci\u00f3n IP solicitada. Un suscriptor DHCP malicioso podr\u00eda ser capaz de emplear esta vulnerabilidad para crear asignaciones de direcciones IP duplicadas, lo que conduce a una denegaci\u00f3n de servicio (DoS) para los suscriptores v\u00e1lidos o la divulgaci\u00f3n de informaci\u00f3n no autorizada mediante la suplantaci\u00f3n de asignaciones de direcciones IP. Las versiones afectadas de Juniper Networks Junos OS son: 15.1 en versiones anteriores a la 15.1R7-S2, 15.1R8; 16.1 en versiones anteriores a la 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 en versiones anteriores a la 16.2R2-S7, 16.2R3; 17.1 en versiones anteriores a la 17.1R2-S9, 17.1R3; 17.2 en versiones anteriores a la 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 en versiones anteriores a la 17.3R2-S4, 17.3R3; 17.4 en versiones anteriores a la 17.4R2 y 18.1 en versiones anteriores a la 18.1R2-S3, 18.1R3.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":5.8}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:P\",\"baseScore\":5.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0952C4-FFCC-4A78-ADFC-289BD6E269DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C56E6C3-BBB6-4853-91D9-99C7676D0CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E0ECBD8-3D66-49DA-A557-5695159F0C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAA2998-A0D6-4818-9E7C-25E8099403E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D211B9-B2FE-4324-AAEE-8825D5238E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E6CD065-EC06-4846-BD2A-D3CA7866070F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7620D01-1A6B-490F-857E-0D803E0AEE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"08FC0245-A4FF-42C0-A236-8569301E351A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"120EA9E3-788B-4CFD-A74F-17111FFD0131\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC40ABB-E364-46C9-A904-C0ED02806250\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE35BDC-7739-4854-8BB8-E8600603DE9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC47132-9EEA-4518-8F86-5CD231FBFB61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5A30CE-9498-4007-8E66-FD0CC6CF1836\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D571B57-4F4C-4232-9D3B-B2F7AAAB220B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3661BC68-6F32-447F-8D20-FD73FBBED9C6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B47EC5-0276-4799-B536-12B33B5F003B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7572C187-4D58-4E0D-A605-B2B13EFF5C6B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64EB45C0-E3BD-4C0D-9E97-1DB726D66401\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F69A0E5-B61B-405D-B501-9CB306651CEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A40E03-F915-4888-87B0-5950F75F097D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"974B6128-ABD2-4D9C-87A1-5F1740DDCB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"988D317A-0646-491F-9B97-853E8E208276\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF736F6-ED05-4DC1-96FB-3F35BA5B3EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A756E2-C320-405A-B24F-7C5022649E5A\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA10892\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA10892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CNVD-2018-21801
Vulnerability from cnvd - Published: 2018-10-25厂商已发布了漏洞修复程序,请及时关注更新: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10892&actp=METADATA
| Name | ['Juniper Networks Junos OS 15.1', 'Juniper Networks Junos OS 16.1', 'Juniper Networks Junos OS 16.2', 'Juniper Networks Junos OS 17.1', 'Juniper Networks Junos OS 17.2', 'Juniper Networks Junos OS 17.3', 'Juniper Networks Junos OS 17.4', 'Juniper Networks Junos OS 18.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-0057",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0057"
}
},
"description": "Juniper Junos OS\u662f\u7f8e\u56fd\u77bb\u535a\u7f51\u7edc\uff08Juniper Networks\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8e\u8be5\u516c\u53f8\u7684\u786c\u4ef6\u7cfb\u7edf\u7684\u7f51\u7edc\u64cd\u4f5c\u7cfb\u7edf\u3002\u8be5\u64cd\u4f5c\u7cfb\u7edf\u63d0\u4f9b\u4e86\u5b89\u5168\u7f16\u7a0b\u63a5\u53e3\u548cJunos SDK\u3002\r\n\r\nJuniper Junos OS\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u9650\u5236\u901a\u8fc7DHCP Option 50\u767b\u5f55\u7684\u8ba2\u9605\u7528\u6237\u8bf7\u6c42\u7684IP\u5730\u5740\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bf9\u5408\u6cd5\u7684\u8ba2\u9605\u7528\u6237\u9020\u6210\u62d2\u7edd\u670d\u52a1\u6216\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
"discovererName": "unKnow",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10892\u0026actp=METADATA",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-21801",
"openTime": "2018-10-25",
"patchDescription": "Juniper Junos OS\u662f\u7f8e\u56fd\u77bb\u535a\u7f51\u7edc\uff08Juniper Networks\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u7528\u4e8e\u8be5\u516c\u53f8\u7684\u786c\u4ef6\u7cfb\u7edf\u7684\u7f51\u7edc\u64cd\u4f5c\u7cfb\u7edf\u3002\u8be5\u64cd\u4f5c\u7cfb\u7edf\u63d0\u4f9b\u4e86\u5b89\u5168\u7f16\u7a0b\u63a5\u53e3\u548cJunos SDK\u3002\r\n\r\nJuniper Junos OS\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u9650\u5236\u901a\u8fc7DHCP Option 50\u767b\u5f55\u7684\u8ba2\u9605\u7528\u6237\u8bf7\u6c42\u7684IP\u5730\u5740\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bf9\u5408\u6cd5\u7684\u8ba2\u9605\u7528\u6237\u9020\u6210\u62d2\u7edd\u670d\u52a1\u6216\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Juniper Junos OS\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2018-21801\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Juniper Networks Junos OS 15.1",
"Juniper Networks Junos OS 16.1",
"Juniper Networks Junos OS 16.2",
"Juniper Networks Junos OS 17.1",
"Juniper Networks Junos OS 17.2",
"Juniper Networks Junos OS 17.3",
"Juniper Networks Junos OS 17.4",
"Juniper Networks Junos OS 18.1"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-0057",
"serverity": "\u4e2d",
"submitTime": "2018-10-19",
"title": "Juniper Junos OS\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2018-21801\uff09"
}
GHSA-6FFM-W2X6-JCWH
Vulnerability from github – Published: 2022-05-13 01:35 – Updated: 2022-05-13 01:35On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3.
{
"affected": [],
"aliases": [
"CVE-2018-0057"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-10-10T18:29:00Z",
"severity": "CRITICAL"
},
"details": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3.",
"id": "GHSA-6ffm-w2x6-jcwh",
"modified": "2022-05-13T01:35:54Z",
"published": "2022-05-13T01:35:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0057"
},
{
"type": "WEB",
"url": "https://kb.juniper.net/JSA10892"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2018-0057
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-0057",
"description": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3.",
"id": "GSD-2018-0057"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-0057"
],
"details": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3.",
"id": "GSD-2018-0057",
"modified": "2023-12-13T01:22:25.258964Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2018-10-10T16:00:00.000Z",
"ID": "CVE-2018-0057",
"STATE": "PUBLIC",
"TITLE": "Junos OS: authd allows assignment of IP address requested by DHCP subscriber logging in with Option 50 (Requested IP Address)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Junos OS",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_name": "15.1",
"version_value": "15.1R7-S2, 15.1R8"
},
{
"affected": "\u003c",
"version_name": "16.1",
"version_value": "16.1R4-S12, 16.1R7-S2, 16.1R8"
},
{
"affected": "\u003c",
"version_name": "16.2",
"version_value": "16.2R2-S7, 16.2R3"
},
{
"affected": "\u003c",
"version_name": "17.1",
"version_value": "17.1R2-S9, 17.1R3"
},
{
"affected": "\u003c",
"version_name": "17.2",
"version_value": "17.2R1-S7, 17.2R2-S6, 17.2R3"
},
{
"affected": "\u003c",
"version_name": "17.3",
"version_value": "17.3R2-S4, 17.3R3"
},
{
"affected": "\u003c",
"version_name": "17.4",
"version_value": "17.4R2"
},
{
"affected": "\u003c",
"version_name": "18.1",
"version_value": "18.1R2-S3, 18.1R3"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "Denial of service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA10892",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10892"
}
]
},
"solution": [
{
"lang": "eng",
"value": "The following software releases have been updated to resolve this specific issue: 15.1R7-S2, 15.1R8, 16.1R4-S12, 16.1R7-S2, 16.1R8, 16.2R2-S7, 16.2R3, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.3R2-S4, 17.3R3, 17.4R2, 18.1R2-S3, 18.1R3, 18.2R1, 18.3R1, and all subsequent releases.\n"
}
],
"source": {
"advisory": "JSA10892",
"defect": [
"1351334"
],
"discovery": "USER"
},
"work_around": [
{
"lang": "eng",
"value": "There are no viable workarounds for this issue"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"ID": "CVE-2018-0057"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA10892",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA10892"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
},
"lastModifiedDate": "2019-10-09T23:31Z",
"publishedDate": "2018-10-10T18:29Z"
}
}
}
CERTFR-2018-AVI-487
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos Space Network Management Platform jusqu'aux versions 18.2R | ||
| Juniper Networks | N/A | Toutes les versions de Juniper Networks Junos Space Security Director jusqu'aux versions 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R4-S9 jusqu'aux versions 16.1R4-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D14 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 jusqu'aux versions 17.2X75-D100 17.2X75-D42 17.2X75-D9 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R1-S7, 17.1R2-S7, 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4R2 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R2 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7-S1 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R2-S6, 17.2R3 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2 et supérieures, incluant 18.2R1 jusqu'aux versions 18.2R1-S2, 18.2R1-S3, 18.2R2 sur toutes les modèles non-SRX et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2X75 jusqu'aux versions 18.2X75-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 jusqu'aux versions 17.2X75-D110, 17.2X75-D9 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R7 sur QFX5000 et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R4-S9 15.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R4 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7-S2, 15.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D47 sur QFX/EX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7, 15.1R8 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R3 sur QFX5000 et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R3 sur QFX5000 et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S12, 16.1R6-S6 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 et supérieures, incluant 18.1R2 jusqu'aux versions 18.1R2-S3, 18.1R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S7, 17.2R2-S6, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 jusqu'aux versions 17.2X75-D42 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R2-S4, 17.3R3-S1 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 et supérieures, incluant 16.2R2-S5 jusqu'aux versions 16.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S6, 17.2R2-S3, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R6-S3 jusqu'aux versions 16.1R6-S | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2X75 jusqu'aux versions 18.2X75-D5 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D471, 15.1X53-D490 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1F6 versions jusqu'aux versions 15.1F6-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 supérieures, incluant 15.1X53-D233 jusqu'aux versions 15.1X53-D235 sur QFX5200/QFX511 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D67 sur QFX10K | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S6, 17.2R2-S4, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions jusqu'aux versions 12.3X48-D75 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S9 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D233 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D130 sur QFabric | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D16 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R4-S9, 15.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D140 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X53 et 15.1X53-D471 jusqu'aux versions 15.1X53-D590 sur NFX150, NFX25 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 versions jusqu'aux versions 12.1X46-D77 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D131, 15.1X49-D140 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions jusqu'aux versions 12.3X48-D7 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 et supérieures, incluant 15.1R7 jusqu'aux versions 15.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D48 sur QFX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S5 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 et supérieures, incluant 17.2R2-S4 jusqu'aux versions 17.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1R6-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 et supérieures, incluant 17.1R2-S7 jusqu'aux versions 17.1R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S3 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53-D47 sur EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX510 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2X75 et supérieures, incluant 18.2X75-D5 jusqu'aux versions 18.2X75-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D235, 15.1X53-D49 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53-D67 sur QFX10000 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R2-S4, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53-D59 sur EX2300/EX340 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R2-S7, 16.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 versions jusqu'aux versions 14.2R4 | ||
| Juniper Networks | Junos OS | Junos OS versions 7.2X75 jusqu'aux versions 17.2X75-D102, 17.2X75-D11 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions jusqu'aux versions 12.3X48-D70 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D471 15.1X53-D490 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 et supérieures, incluant 17.2X75-D100 jusqu'aux versions X17.2X75-D101, 17.2X75-D11 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S12, 16.1R7-S2, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R1-S4, 17.3R2-S2, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 et supérieures, incluant 17.4R1-S3 jusqu'aux versions 17.4R1-S5 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R2-S4, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D59 sur EX2300/EX3400 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R3-S | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R5-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S9, 16.1R6-S1, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R3-S9, 16.1R4-S9, 16.1R5-S4, 16.1R6-S4, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2-S3, 18.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 et supérieures, incluant 15.1F6-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R3-S8 16.1R4-S8 16.1R5-S4 16.1R6-S4 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S9, 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R2-S7 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S9, 17.1R3 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 et supérieures, incluant 17.3R2-S2 jusqu'aux versions 17.3R2-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R4-S9, 15.1R6-S6, 15.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1R4-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S11, 16.1R6-S6, 16.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S7, 17.2R2-S6 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D30 sur vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R2-S2, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 versions jusqu'aux versions 12.1X46-D7 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R1-S7 17.1R2-S6 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 et supérieures, incluant 15.1X49-D131 jusqu'aux versions 15.1X49-D150 sur SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 et supérieures, incluant 12.3X48-D66 jusqu'aux versions 12.3X48-D75 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R7 jusqu'aux versions 16.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R1-S6 16.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1F | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3R12-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 et supérieures, incluant 17.3R1-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S3, 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R1-S5, 17.3R2-S2, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 et supérieures, incluant 16.2R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R1-S4 17.3R2-S2 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D47 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S7, 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D233 sur QFX5200/QFX5110 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 et supérieures, incluant 14.1X53-D115 jusqu'aux versions 14.1X53-D130 sur QFabric | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 versions jusqu'aux versions 14.1X53-D130 sur QFabric | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3 versions jusqu'aux versions 12.3R12-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R1-S6, 16.2R2-S6, 16.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2 jusqu'aux versions 18.2R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 et supérieures, incluant 12.1X46-D76 jusqu'aux versions 12.1X46-D81 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1 versions jusqu'aux versions 14.1R8-S5, 14.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S5, 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R3-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1X65 jusqu'aux versions 16.1X65-D4 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2 sur QFX5000 Series et EX4600 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space Network Management Platform jusqu\u0027aux versions 18.2R",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Toutes les versions de Juniper Networks Junos Space Security Director jusqu\u0027aux versions 17.2R",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R4-S9 jusqu\u0027aux versions 16.1R4-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D14",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 jusqu\u0027aux versions 17.2X75-D100 17.2X75-D42 17.2X75-D9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R1-S7, 17.1R2-S7, 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4R2 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R2 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7-S1 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R2-S6, 17.2R3 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2 et sup\u00e9rieures, incluant 18.2R1 jusqu\u0027aux versions 18.2R1-S2, 18.2R1-S3, 18.2R2 sur toutes les mod\u00e8les non-SRX et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2X75 jusqu\u0027aux versions 18.2X75-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 jusqu\u0027aux versions 17.2X75-D110, 17.2X75-D9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R7 sur QFX5000 et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R4-S9 15.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R4 sur NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7-S2, 15.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D47 sur QFX/EX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7, 15.1R8 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R3 sur QFX5000 et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R3 sur QFX5000 et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S12, 16.1R6-S6 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 et sup\u00e9rieures, incluant 18.1R2 jusqu\u0027aux versions 18.1R2-S3, 18.1R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S7, 17.2R2-S6, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 jusqu\u0027aux versions 17.2X75-D42 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R2-S4, 17.3R3-S1 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 et sup\u00e9rieures, incluant 16.2R2-S5 jusqu\u0027aux versions 16.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S6, 17.2R2-S3, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R6-S3 jusqu\u0027aux versions 16.1R6-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2X75 jusqu\u0027aux versions 18.2X75-D5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D471, 15.1X53-D490 sur NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1F6 versions jusqu\u0027aux versions 15.1F6-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 sup\u00e9rieures, incluant 15.1X53-D233 jusqu\u0027aux versions 15.1X53-D235 sur QFX5200/QFX511",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D67 sur QFX10K",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S6, 17.2R2-S4, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 versions jusqu\u0027aux versions 12.3X48-D75 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S9 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D233 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D130 sur QFabric",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D16",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R4-S9, 15.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D140 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X53 et 15.1X53-D471 jusqu\u0027aux versions 15.1X53-D590 sur NFX150, NFX25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 versions jusqu\u0027aux versions 12.1X46-D77 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D131, 15.1X49-D140 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 versions jusqu\u0027aux versions 12.3X48-D7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 et sup\u00e9rieures, incluant 15.1R7 jusqu\u0027aux versions 15.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D48 sur QFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S5 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 et sup\u00e9rieures, incluant 17.2R2-S4 jusqu\u0027aux versions 17.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1R6-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 et sup\u00e9rieures, incluant 17.1R2-S7 jusqu\u0027aux versions 17.1R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S3 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53-D47 sur EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX510",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2X75 et sup\u00e9rieures, incluant 18.2X75-D5 jusqu\u0027aux versions 18.2X75-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D235, 15.1X53-D49",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53-D67 sur QFX10000",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R2-S4, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53-D59 sur EX2300/EX340",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R2-S7, 16.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 versions jusqu\u0027aux versions 14.2R4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 7.2X75 jusqu\u0027aux versions 17.2X75-D102, 17.2X75-D11",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 versions jusqu\u0027aux versions 12.3X48-D70 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D471 15.1X53-D490 sur NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 et sup\u00e9rieures, incluant 17.2X75-D100 jusqu\u0027aux versions X17.2X75-D101, 17.2X75-D11",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S12, 16.1R7-S2, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R1-S4, 17.3R2-S2, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 et sup\u00e9rieures, incluant 17.4R1-S3 jusqu\u0027aux versions 17.4R1-S5 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R2-S4, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D59 sur EX2300/EX3400",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R3-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R5-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S9, 16.1R6-S1, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R3-S9, 16.1R4-S9, 16.1R5-S4, 16.1R6-S4, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2-S3, 18.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 et sup\u00e9rieures, incluant 15.1F6-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R3-S8 16.1R4-S8 16.1R5-S4 16.1R6-S4 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S9, 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R2-S7 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S9, 17.1R3 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 et sup\u00e9rieures, incluant 17.3R2-S2 jusqu\u0027aux versions 17.3R2-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R4-S9, 15.1R6-S6, 15.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1R4-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S11, 16.1R6-S6, 16.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S7, 17.2R2-S6 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D30 sur vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R2-S2, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 versions jusqu\u0027aux versions 12.1X46-D7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R1-S7 17.1R2-S6 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 et sup\u00e9rieures, incluant 15.1X49-D131 jusqu\u0027aux versions 15.1X49-D150 sur SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 et sup\u00e9rieures, incluant 12.3X48-D66 jusqu\u0027aux versions 12.3X48-D75 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R7 jusqu\u0027aux versions 16.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R1-S6 16.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1F",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3R12-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 et sup\u00e9rieures, incluant 17.3R1-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S3, 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R1-S5, 17.3R2-S2, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 et sup\u00e9rieures, incluant 16.2R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R1-S4 17.3R2-S2 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D47 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S7, 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D233 sur QFX5200/QFX5110",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 et sup\u00e9rieures, incluant 14.1X53-D115 jusqu\u0027aux versions 14.1X53-D130 sur QFabric",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 versions jusqu\u0027aux versions 14.1X53-D130 sur QFabric",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3 versions jusqu\u0027aux versions 12.3R12-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R1-S6, 16.2R2-S6, 16.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2 jusqu\u0027aux versions 18.2R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 et sup\u00e9rieures, incluant 12.1X46-D76 jusqu\u0027aux versions 12.1X46-D81 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1 versions jusqu\u0027aux versions 14.1R8-S5, 14.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S5, 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R3-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1X65 jusqu\u0027aux versions 16.1X65-D4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2 sur QFX5000 Series et EX4600",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0056"
},
{
"name": "CVE-2018-0043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0043"
},
{
"name": "CVE-2016-10011",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10011"
},
{
"name": "CVE-2018-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0045"
},
{
"name": "CVE-2018-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0049"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2018-0044",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0044"
},
{
"name": "CVE-2018-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0055"
},
{
"name": "CVE-2018-0046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0046"
},
{
"name": "CVE-2018-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0053"
},
{
"name": "CVE-2017-15906",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15906"
},
{
"name": "CVE-2016-10010",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10010"
},
{
"name": "CVE-2018-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0054"
},
{
"name": "CVE-2018-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0052"
},
{
"name": "CVE-2018-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0051"
},
{
"name": "CVE-2018-0047",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0047"
},
{
"name": "CVE-2016-10012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10012"
},
{
"name": "CVE-2018-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0057"
},
{
"name": "CVE-2018-0050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0050"
},
{
"name": "CVE-2018-0048",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0048"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-487",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10883 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10883\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10892 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10892\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10882 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10882\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10880 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10880\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10889 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10889\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10884 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10884\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10890 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10890\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10881 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10881\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10886 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10886\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10879 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10879\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10878 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10878\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10887 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10887\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10885 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10885\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10877 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10877\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10888 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10888\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-487
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Junos Space Network Management Platform jusqu'aux versions 18.2R | ||
| Juniper Networks | N/A | Toutes les versions de Juniper Networks Junos Space Security Director jusqu'aux versions 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R4-S9 jusqu'aux versions 16.1R4-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D14 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 jusqu'aux versions 17.2X75-D100 17.2X75-D42 17.2X75-D9 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R1-S7, 17.1R2-S7, 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4R2 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R2 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7-S1 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R2-S6, 17.2R3 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2 et supérieures, incluant 18.2R1 jusqu'aux versions 18.2R1-S2, 18.2R1-S3, 18.2R2 sur toutes les modèles non-SRX et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2X75 jusqu'aux versions 18.2X75-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 jusqu'aux versions 17.2X75-D110, 17.2X75-D9 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R2 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R7 sur QFX5000 et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R4-S9 15.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R4 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7-S2, 15.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D47 sur QFX/EX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R7, 15.1R8 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R3 sur QFX5000 et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R3 sur QFX5000 et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S12, 16.1R6-S6 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 et supérieures, incluant 18.1R2 jusqu'aux versions 18.1R2-S3, 18.1R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S7, 17.2R2-S6, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 jusqu'aux versions 17.2X75-D42 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R2-S4, 17.3R3-S1 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 et supérieures, incluant 16.2R2-S5 jusqu'aux versions 16.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S6, 17.2R2-S3, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R6-S3 jusqu'aux versions 16.1R6-S | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2X75 jusqu'aux versions 18.2X75-D5 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D471, 15.1X53-D490 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1F6 versions jusqu'aux versions 15.1F6-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 supérieures, incluant 15.1X53-D233 jusqu'aux versions 15.1X53-D235 sur QFX5200/QFX511 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D67 sur QFX10K | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S6, 17.2R2-S4, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions jusqu'aux versions 12.3X48-D75 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S9 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D233 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D130 sur QFabric | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D16 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R4-S9, 15.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D140 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 15.1X53 et 15.1X53-D471 jusqu'aux versions 15.1X53-D590 sur NFX150, NFX25 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 versions jusqu'aux versions 12.1X46-D77 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D131, 15.1X49-D140 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions jusqu'aux versions 12.3X48-D7 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 et supérieures, incluant 15.1R7 jusqu'aux versions 15.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D48 sur QFX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S5 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 et supérieures, incluant 17.2R2-S4 jusqu'aux versions 17.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1R6-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 et supérieures, incluant 17.1R2-S7 jusqu'aux versions 17.1R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S3 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53-D47 sur EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX510 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2X75 et supérieures, incluant 18.2X75-D5 jusqu'aux versions 18.2X75-D20 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D235, 15.1X53-D49 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53-D67 sur QFX10000 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R2-S4, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53-D59 sur EX2300/EX340 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R2-S7, 16.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 versions jusqu'aux versions 14.2R4 | ||
| Juniper Networks | Junos OS | Junos OS versions 7.2X75 jusqu'aux versions 17.2X75-D102, 17.2X75-D11 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions jusqu'aux versions 12.3X48-D70 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D471 15.1X53-D490 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 et supérieures, incluant 17.2X75-D100 jusqu'aux versions X17.2X75-D101, 17.2X75-D11 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S12, 16.1R7-S2, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R1-S4, 17.3R2-S2, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 et supérieures, incluant 17.4R1-S3 jusqu'aux versions 17.4R1-S5 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R2-S4, 17.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D59 sur EX2300/EX3400 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R3-S | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R5-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S9, 16.1R6-S1, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R3-S9, 16.1R4-S9, 16.1R5-S4, 16.1R6-S4, 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2-S3, 18.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 et supérieures, incluant 15.1F6-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R3-S8 16.1R4-S8 16.1R5-S4 16.1R6-S4 16.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S9, 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R2-S7 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S9, 17.1R3 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 et supérieures, incluant 17.3R2-S2 jusqu'aux versions 17.3R2-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 jusqu'aux versions 15.1R4-S9, 15.1R6-S6, 15.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1R4-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 jusqu'aux versions 16.1R4-S11, 16.1R6-S6, 16.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2 jusqu'aux versions 17.2R1-S7, 17.2R2-S6 sur MX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 jusqu'aux versions 15.1X49-D30 sur vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R2-S2, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 versions jusqu'aux versions 12.1X46-D7 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R1-S7 17.1R2-S6 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 et supérieures, incluant 15.1X49-D131 jusqu'aux versions 15.1X49-D150 sur SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 et supérieures, incluant 12.3X48-D66 jusqu'aux versions 12.3X48-D75 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R7 jusqu'aux versions 16.1R7-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R1-S6 16.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1F | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3R12-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 et supérieures, incluant 17.3R1-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R2-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S3, 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R1-S5, 17.3R2-S2, 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 et supérieures, incluant 16.2R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 17.3 jusqu'aux versions 17.3R1-S4 17.3R2-S2 17.3R | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 versions jusqu'aux versions 14.1X53-D47 sur QFX5000 Series et EX460 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 jusqu'aux versions 17.1R2-S7, 17.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 jusqu'aux versions 15.1X53-D233 sur QFX5200/QFX5110 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 et supérieures, incluant 14.1X53-D115 jusqu'aux versions 14.1X53-D130 sur QFabric | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 versions jusqu'aux versions 14.1X53-D130 sur QFabric | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3 versions jusqu'aux versions 12.3R12-S1 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 jusqu'aux versions 16.2R1-S6, 16.2R2-S6, 16.2R | ||
| Juniper Networks | Junos OS | Junos OS versions 18.2 jusqu'aux versions 18.2R1-S | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 et supérieures, incluant 12.1X46-D76 jusqu'aux versions 12.1X46-D81 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1 versions jusqu'aux versions 14.1R8-S5, 14.1R | ||
| Juniper Networks | Junos OS | Junos OS versions 17.4 jusqu'aux versions 17.4R1-S5, 17.4R | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 et supérieures, incluant 16.1R3-S | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1X65 jusqu'aux versions 16.1X65-D4 | ||
| Juniper Networks | Junos OS | Junos OS versions 18.1 jusqu'aux versions 18.1R2 sur QFX5000 Series et EX4600 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space Network Management Platform jusqu\u0027aux versions 18.2R",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Toutes les versions de Juniper Networks Junos Space Security Director jusqu\u0027aux versions 17.2R",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R4-S9 jusqu\u0027aux versions 16.1R4-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D14",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 jusqu\u0027aux versions 17.2X75-D100 17.2X75-D42 17.2X75-D9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R1-S7, 17.1R2-S7, 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4R2 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R2 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7-S1 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R2-S6, 17.2R3 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2 et sup\u00e9rieures, incluant 18.2R1 jusqu\u0027aux versions 18.2R1-S2, 18.2R1-S3, 18.2R2 sur toutes les mod\u00e8les non-SRX et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2X75 jusqu\u0027aux versions 18.2X75-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 jusqu\u0027aux versions 17.2X75-D110, 17.2X75-D9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R2",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R7 sur QFX5000 et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R4-S9 15.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R4 sur NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7-S2, 15.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D47 sur QFX/EX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R7, 15.1R8 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R3 sur QFX5000 et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R3 sur QFX5000 et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S12, 16.1R6-S6 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 et sup\u00e9rieures, incluant 18.1R2 jusqu\u0027aux versions 18.1R2-S3, 18.1R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S7, 17.2R2-S6, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 jusqu\u0027aux versions 17.2X75-D42 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R2-S4, 17.3R3-S1 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 et sup\u00e9rieures, incluant 16.2R2-S5 jusqu\u0027aux versions 16.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S6, 17.2R2-S3, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R6-S3 jusqu\u0027aux versions 16.1R6-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2X75 jusqu\u0027aux versions 18.2X75-D5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D471, 15.1X53-D490 sur NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1F6 versions jusqu\u0027aux versions 15.1F6-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 sup\u00e9rieures, incluant 15.1X53-D233 jusqu\u0027aux versions 15.1X53-D235 sur QFX5200/QFX511",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D67 sur QFX10K",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S6, 17.2R2-S4, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 versions jusqu\u0027aux versions 12.3X48-D75 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S9 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D233 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D130 sur QFabric",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D16",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R4-S9, 15.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D140 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 15.1X53 et 15.1X53-D471 jusqu\u0027aux versions 15.1X53-D590 sur NFX150, NFX25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 versions jusqu\u0027aux versions 12.1X46-D77 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D131, 15.1X49-D140 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 versions jusqu\u0027aux versions 12.3X48-D7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 et sup\u00e9rieures, incluant 15.1R7 jusqu\u0027aux versions 15.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D48 sur QFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S5 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 et sup\u00e9rieures, incluant 17.2R2-S4 jusqu\u0027aux versions 17.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1R6-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 et sup\u00e9rieures, incluant 17.1R2-S7 jusqu\u0027aux versions 17.1R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S3 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53-D47 sur EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX510",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2X75 et sup\u00e9rieures, incluant 18.2X75-D5 jusqu\u0027aux versions 18.2X75-D20",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D235, 15.1X53-D49",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53-D67 sur QFX10000",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R2-S4, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53-D59 sur EX2300/EX340",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R2-S7, 16.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 versions jusqu\u0027aux versions 14.2R4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 7.2X75 jusqu\u0027aux versions 17.2X75-D102, 17.2X75-D11",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 versions jusqu\u0027aux versions 12.3X48-D70 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3R3 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D471 15.1X53-D490 sur NFX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75 et sup\u00e9rieures, incluant 17.2X75-D100 jusqu\u0027aux versions X17.2X75-D101, 17.2X75-D11",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S12, 16.1R7-S2, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R1-S4, 17.3R2-S2, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 et sup\u00e9rieures, incluant 17.4R1-S3 jusqu\u0027aux versions 17.4R1-S5 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R2-S4, 17.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D59 sur EX2300/EX3400",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R3-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R5-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S9, 16.1R6-S1, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R3-S9, 16.1R4-S9, 16.1R5-S4, 16.1R6-S4, 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2-S3, 18.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 et sup\u00e9rieures, incluant 15.1F6-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R3-S8 16.1R4-S8 16.1R5-S4 16.1R6-S4 16.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S9, 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R2-S7 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S9, 17.1R3 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 et sup\u00e9rieures, incluant 17.3R2-S2 jusqu\u0027aux versions 17.3R2-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 jusqu\u0027aux versions 15.1R4-S9, 15.1R6-S6, 15.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1R4-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 jusqu\u0027aux versions 16.1R4-S11, 16.1R6-S6, 16.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2 jusqu\u0027aux versions 17.2R1-S7, 17.2R2-S6 sur MX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 jusqu\u0027aux versions 15.1X49-D30 sur vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R2-S2, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 versions jusqu\u0027aux versions 12.1X46-D7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R1-S7 17.1R2-S6 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X49 et sup\u00e9rieures, incluant 15.1X49-D131 jusqu\u0027aux versions 15.1X49-D150 sur SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48 et sup\u00e9rieures, incluant 12.3X48-D66 jusqu\u0027aux versions 12.3X48-D75 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R7 jusqu\u0027aux versions 16.1R7-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R1-S6 16.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1F",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3R12-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 et sup\u00e9rieures, incluant 17.3R1-S4 sur All non-SRX Series et SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 et vSR",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R2-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S3, 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R1-S5, 17.3R2-S2, 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 et sup\u00e9rieures, incluant 16.2R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.3 jusqu\u0027aux versions 17.3R1-S4 17.3R2-S2 17.3R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 versions jusqu\u0027aux versions 14.1X53-D47 sur QFX5000 Series et EX460",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.1 jusqu\u0027aux versions 17.1R2-S7, 17.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53 jusqu\u0027aux versions 15.1X53-D233 sur QFX5200/QFX5110",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53 et sup\u00e9rieures, incluant 14.1X53-D115 jusqu\u0027aux versions 14.1X53-D130 sur QFabric",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.2 versions jusqu\u0027aux versions 14.1X53-D130 sur QFabric",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3 versions jusqu\u0027aux versions 12.3R12-S1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.2 jusqu\u0027aux versions 16.2R1-S6, 16.2R2-S6, 16.2R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.2 jusqu\u0027aux versions 18.2R1-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46 et sup\u00e9rieures, incluant 12.1X46-D76 jusqu\u0027aux versions 12.1X46-D81 sur SRX",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1 versions jusqu\u0027aux versions 14.1R8-S5, 14.1R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.4 jusqu\u0027aux versions 17.4R1-S5, 17.4R",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1 et sup\u00e9rieures, incluant 16.1R3-S",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1X65 jusqu\u0027aux versions 16.1X65-D4",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 18.1 jusqu\u0027aux versions 18.1R2 sur QFX5000 Series et EX4600",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0056"
},
{
"name": "CVE-2018-0043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0043"
},
{
"name": "CVE-2016-10011",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10011"
},
{
"name": "CVE-2018-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0045"
},
{
"name": "CVE-2018-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0049"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2018-0044",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0044"
},
{
"name": "CVE-2018-0055",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0055"
},
{
"name": "CVE-2018-0046",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0046"
},
{
"name": "CVE-2018-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0053"
},
{
"name": "CVE-2017-15906",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15906"
},
{
"name": "CVE-2016-10010",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10010"
},
{
"name": "CVE-2018-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0054"
},
{
"name": "CVE-2018-0052",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0052"
},
{
"name": "CVE-2018-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0051"
},
{
"name": "CVE-2018-0047",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0047"
},
{
"name": "CVE-2016-10012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10012"
},
{
"name": "CVE-2018-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0057"
},
{
"name": "CVE-2018-0050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0050"
},
{
"name": "CVE-2018-0048",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0048"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-487",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10883 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10883\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10892 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10892\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10882 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10882\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10880 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10880\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10889 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10889\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10884 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10884\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10890 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10890\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10881 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10881\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10886 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10886\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10879 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10879\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10878 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10878\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10887 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10887\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10885 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10885\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10877 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10877\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10888 du 10 octobre 2018",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10888\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
VAR-201810-0079
Vulnerability from variot - Updated: 2023-12-18 12:18On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3. Juniper Networks Junos OS Contains an input validation vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. Attackers can exploit this vulnerability to cause denial of service to legitimate subscribers or obtain sensitive information. The following versions based on MX series and M120/M320 platforms are affected: Juniper Junos OS Release 15.1, Release 16.1, Release 16.2, Release 17.1, Release 17.2, Release 17.3, Release 17.4, Release 18.1
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201810-0079",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "16.1"
},
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "16.2"
},
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "17.2"
},
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "17.3"
},
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "17.4"
},
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "18.1"
},
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "15.1"
},
{
"model": "junos",
"scope": "eq",
"trust": 1.0,
"vendor": "juniper",
"version": "17.1"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "16.1r4-s12"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "16.1r6-s6"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "17.3r2-s4"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "16.2r2-s7"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "18.1"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "17.3"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "15.1r7-s1"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "17.1r2-s9"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "16.2"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "17.4"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "18.1r2"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "17.2"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "16.1"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "17.2r2-s6"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "17.3r3-s1"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "17.1"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "17.2r1-s7"
},
{
"model": "junos os",
"scope": "lt",
"trust": 0.8,
"vendor": "juniper",
"version": "15.1"
},
{
"model": "junos os",
"scope": "eq",
"trust": 0.8,
"vendor": "juniper",
"version": "17.4r1-s5"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "NVD",
"id": "CVE-2018-0057"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-0057"
}
]
},
"cve": "CVE-2018-0057",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "Single",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-0057",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-118259",
"impactScore": 4.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.1,
"impactScore": 5.8,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"author": "sirt@juniper.net",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.6,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2018-0057",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "Low",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-0057",
"trust": 1.8,
"value": "CRITICAL"
},
{
"author": "sirt@juniper.net",
"id": "CVE-2018-0057",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201810-525",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-118259",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-118259"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3. Juniper Networks Junos OS Contains an input validation vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company\u0027s hardware systems. The operating system provides a secure programming interface and Junos SDK. Attackers can exploit this vulnerability to cause denial of service to legitimate subscribers or obtain sensitive information. The following versions based on MX series and M120/M320 platforms are affected: Juniper Junos OS Release 15.1, Release 16.1, Release 16.2, Release 17.1, Release 17.2, Release 17.3, Release 17.4, Release 18.1",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "VULHUB",
"id": "VHN-118259"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-0057",
"trust": 2.5
},
{
"db": "JUNIPER",
"id": "JSA10892",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013645",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201810-525",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-118259",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-118259"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
]
},
"id": "VAR-201810-0079",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-118259"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:18:30.639000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "JSA10892",
"trust": 0.8,
"url": "https://kb.juniper.net/jsa10892"
},
{
"title": "Juniper Junos OS Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86111"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-20",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-118259"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "NVD",
"id": "CVE-2018-0057"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://kb.juniper.net/jsa10892"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0057"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-0057"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-118259"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-118259"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-10T00:00:00",
"db": "VULHUB",
"id": "VHN-118259"
},
{
"date": "2019-02-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"date": "2018-10-10T18:29:02.983000",
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"date": "2018-10-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-118259"
},
{
"date": "2019-02-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-013645"
},
{
"date": "2019-10-09T23:31:09.567000",
"db": "NVD",
"id": "CVE-2018-0057"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Juniper Networks Junos OS Input validation vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-013645"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201810-525"
}
],
"trust": 0.6
}
}
FKIE_CVE-2018-0057
Vulnerability from fkie_nvd - Published: 2018-10-10 18:29 - Updated: 2024-11-21 03:379.6 (Critical) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| sirt@juniper.net | https://kb.juniper.net/JSA10892 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA10892 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 16.1 | |
| juniper | junos | 16.1 | |
| juniper | junos | 16.1 | |
| juniper | junos | 16.1 | |
| juniper | junos | 16.2 | |
| juniper | junos | 16.2 | |
| juniper | junos | 17.1 | |
| juniper | junos | 17.1 | |
| juniper | junos | 17.2 | |
| juniper | junos | 17.3 | |
| juniper | junos | 17.3 | |
| juniper | junos | 17.4 | |
| juniper | junos | 17.4 | |
| juniper | junos | 18.1 | |
| juniper | junos | 18.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BD0952C4-FFCC-4A78-ADFC-289BD6E269DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"matchCriteriaId": "1C56E6C3-BBB6-4853-91D9-99C7676D0CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"matchCriteriaId": "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"matchCriteriaId": "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"matchCriteriaId": "2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"matchCriteriaId": "71D211B9-B2FE-4324-AAEE-8825D5238E48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "0E6CD065-EC06-4846-BD2A-D3CA7866070F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "C7620D01-1A6B-490F-857E-0D803E0AEE56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "08FC0245-A4FF-42C0-A236-8569301E351A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "120EA9E3-788B-4CFD-A74F-17111FFD0131",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC40ABB-E364-46C9-A904-C0ED02806250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "BBE35BDC-7739-4854-8BB8-E8600603DE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "2DC47132-9EEA-4518-8F86-5CD231FBFB61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "CD5A30CE-9498-4007-8E66-FD0CC6CF1836",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4D571B57-4F4C-4232-9D3B-B2F7AAAB220B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "3661BC68-6F32-447F-8D20-FD73FBBED9C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "50B47EC5-0276-4799-B536-12B33B5F003B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "7572C187-4D58-4E0D-A605-B2B13EFF5C6B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "64EB45C0-E3BD-4C0D-9E97-1DB726D66401",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0F69A0E5-B61B-405D-B501-9CB306651CEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "38A40E03-F915-4888-87B0-5950F75F097D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "974B6128-ABD2-4D9C-87A1-5F1740DDCB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"matchCriteriaId": "988D317A-0646-491F-9B97-853E8E208276",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF736F6-ED05-4DC1-96FB-3F35BA5B3EFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "B0A756E2-C320-405A-B24F-7C5022649E5A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On MX Series and M120/M320 platforms configured in a Broadband Edge (BBE) environment, subscribers logging in with DHCP Option 50 to request a specific IP address will be assigned the requested IP address, even if there is a static MAC to IP address binding in the access profile. In the problem scenario, with a hardware-address and IP address configured under address-assignment pool, if a subscriber logging in with DHCP Option 50, the subscriber will not be assigned an available address from the matched pool, but will still get the requested IP address. A malicious DHCP subscriber may be able to utilize this vulnerability to create duplicate IP address assignments, leading to a denial of service for valid subscribers or unauthorized information disclosure via IP address assignment spoofing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S2, 15.1R8; 16.1 versions prior to 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 versions prior to 16.2R2-S7, 16.2R3; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3; 17.4 versions prior to 17.4R2; 18.1 versions prior to 18.1R2-S3, 18.1R3."
},
{
"lang": "es",
"value": "En las plataformas MX Series y M120/M320 configuradas en un entorno Broadband Edge (BBE), los suscriptores que inician sesi\u00f3n con DHCP Option 50 para solicitar una direcci\u00f3n IP espec\u00edfica tendr\u00e1n asignada la direcci\u00f3n IP que soliciten, incluso aunque haya un enlace de MAC est\u00e1tica a direcci\u00f3n IP en el perfil de acceso. En el escenario de problemas, con una direcci\u00f3n de hardware y una direcci\u00f3n IP configurada bajo el grupo address-assignment, si un suscriptor inicia sesi\u00f3n con DHCP Option 50, \u00e9ste no recibir\u00e1 una direcci\u00f3n disponible del grupo de coincidencias, pero seguir\u00e1 recibiendo la direcci\u00f3n IP solicitada. Un suscriptor DHCP malicioso podr\u00eda ser capaz de emplear esta vulnerabilidad para crear asignaciones de direcciones IP duplicadas, lo que conduce a una denegaci\u00f3n de servicio (DoS) para los suscriptores v\u00e1lidos o la divulgaci\u00f3n de informaci\u00f3n no autorizada mediante la suplantaci\u00f3n de asignaciones de direcciones IP. Las versiones afectadas de Juniper Networks Junos OS son: 15.1 en versiones anteriores a la 15.1R7-S2, 15.1R8; 16.1 en versiones anteriores a la 16.1R4-S12, 16.1R7-S2, 16.1R8; 16.2 en versiones anteriores a la 16.2R2-S7, 16.2R3; 17.1 en versiones anteriores a la 17.1R2-S9, 17.1R3; 17.2 en versiones anteriores a la 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 en versiones anteriores a la 17.3R2-S4, 17.3R3; 17.4 en versiones anteriores a la 17.4R2 y 18.1 en versiones anteriores a la 18.1R2-S3, 18.1R3."
}
],
"id": "CVE-2018-0057",
"lastModified": "2024-11-21T03:37:28.720",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "sirt@juniper.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-10-10T18:29:02.983",
"references": [
{
"source": "sirt@juniper.net",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA10892"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA10892"
}
],
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.