Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0036— Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored

EPSS 0.26% · P49
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-0036

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored
Source: NVD (National Vulnerability Database)
Vulnerability Description
When configuring a stateless firewall filter in Junos OS, terms named using the format "internal-n" (e.g. "internal-1", "internal-2", etc.) are silently ignored. No warning is issued during configuration, and the config is committed without error, but the filter criteria will match all packets leading to unexpected results. Affected releases are Juniper Networks Junos OS: All versions prior to and including 12.3; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D161, 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4, 16.1R7-S5; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S7, 17.4R2-S3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S1; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3; 18.4 versions prior to 18.4R1-S1, 18.4R1-S2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS中存在代码问题漏洞。该漏洞源于网络系统或产品的代码开发过程中存在设计或实现不当的问题。以下产品及版本受到影响:Juniper Networks Junos OS 12.1X46版本,12.3版本,12.3X48版本,14.1X53版本,15.1版本,15.1X
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 12.1X46 -

II. Public POCs for CVE-2019-0036

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-0036

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2019-04-10 · 16 CVEs total

CVE-2019-0008QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding
CVE-2019-0019BGP packets can trigger rpd crash when BGP tracing is enabled.
CVE-2019-0028Junos OS: RPD process crashes due to specific BGP peer restarts condition.
CVE-2019-0031Junos OS: jdhcpd daemon memory consumption Denial of Service when receiving specific IPv6
CVE-2019-0032Junos Space Service Now and Service Insight: Organization username and password stored in
CVE-2019-0033SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when pr
CVE-2019-0035Junos OS: 'set system ports console insecure' allows root password recovery on OAM volumes
CVE-2019-0037Junos OS: jdhcpd crash upon receipt of crafted DHCPv6 solicit message
CVE-2019-0038SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices
CVE-2019-0039Junos OS: Login credentials are vulnerable to brute force attacks through the REST API
CVE-2019-0040Junos OS: Specially crafted packets sent to port 111 on any interface triggers responses f
CVE-2019-0041Junos OS: EX4300-MP Series: IP transit traffic can reach the control plane via loopback in
CVE-2019-0042Incorrect messages from Juniper Identity Management Service (JIMS) can trigger Denial of S
CVE-2019-0043Junos OS: RPD process crashes upon receipt of a specific SNMP packet
CVE-2019-0044Junos OS: SRX5000 series: Kernel crash (vmcore) upon receipt of a specific packet on fxp0

IV. Related Vulnerabilities

V. Comments for CVE-2019-0036

No comments yet


Leave a comment