Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1600— Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon.

CVSS 6.5 · Medium EPSS 0.21% · P43
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1600

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: A specific SNMP command can trigger a high CPU usage Denial of Service in the RPD daemon.
Source: NVD (National Vulnerability Database)
Vulnerability Description
In a Point-to-Multipoint (P2MP) Label Switched Path (LSP) scenario, an uncontrolled resource consumption vulnerability in the Routing Protocol Daemon (RPD) in Juniper Networks Junos OS allows a specific SNMP request to trigger an infinite loop causing a high CPU usage Denial of Service (DoS) condition. This issue affects both SNMP over IPv4 and IPv6. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D90; 15.1 versions prior to 15.1R7-S6; 15.1X49 versions prior to 15.1X49-D200; 15.1X53 versions prior to 15.1X53-D238, 15.1X53-D592; 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R3-S2; 17.3 versions prior to 17.3R3-S7; 17.4 versions prior to 17.4R2-S4, 17.4R3; 18.1 versions prior to 18.1R3-S5; 18.2 versions prior to 18.2R3; 18.2X75 versions prior to 18.2X75-D50; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS中的Routing Protocol Daemon(RPD)存在资源管理错误漏洞。攻击者可利用该漏洞造成拒绝服务(无限循环和CPU大量消耗)。以下产品及版本受到影响:Juniper Networks Junos OS 12.3X48版本,15.1版本,15.1
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 12.3X48 ~ 12.3X48-D90 -

II. Public POCs for CVE-2020-1600

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1600

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2020-01-15 · 11 CVEs total

CVE-2020-16058.8 HIGHJunos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafte
CVE-2020-16098.8 HIGHJunos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafte
CVE-2020-16038.6 HIGHJunos OS: Improper handling of specific IPv6 packets sent by clients eventually kernel cra
CVE-2020-16077.5 HIGHJunos OS: Cross-Site Scripting (XSS) in J-Web
CVE-2020-16087.5 HIGHJunos OS: MX Series: In BBE configurations, receipt of a specific MPLS or IPv6 packet caus
CVE-2020-16027.1 HIGHJunos OS and Junos OS Evolved: A vulnerability in JDHCPD allows an attacker to send crafte
CVE-2020-16046.5 MEDIUMJunos OS: EX4300/EX4600/QFX3500/QFX5100 Series: Stateless IP firewall filter may fail to e
CVE-2020-16116.5 MEDIUMJunos Space: Malicious HTTP packets sent to Junos Space allow an attacker to view all file
CVE-2020-16065.4 MEDIUMJunos OS: Path traversal vulnerability in J-Web
CVE-2020-16015.3 MEDIUMJunos OS: Upon receipt of certain types of malformed PCEP packets the pccd process may cra

IV. Related Vulnerabilities

V. Comments for CVE-2020-1600

No comments yet


Leave a comment