Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1655— Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmentation

CVSS 5.3 · Medium EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1655

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of large packets requiring fragmentation
Source: NVD (National Vulnerability Database)
Vulnerability Description
When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9 line cards installed and the system is configured for inline IP reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding engine (PFE) will become disabled upon receipt of large packets requiring fragmentation, generating the following error messages: [LOG: Err] MQSS(0): WO: Packet Error - Error Packets 1, Connection 29 [LOG: Err] eachip_hmcif_rx_intr_handler(7259): EA[0:0]: HMCIF Rx: Injected checksum error detected on WO response - Chunk Address 0x0 [LOG: Err] MQSS(0): DRD: RORD1: CMD reorder ID error - Command 11, Reorder ID 1838, QID 0 [LOG: Err] MQSS(0): DRD: UNROLL0: HMC chunk length error in stage 5 - Chunk Address: 0x4321f3 [LOG: Err] MQSS(0): DRD: UNROLL0: HMC chunk address error in stage 5 - Chunk Address: 0x0 [LOG: Notice] Error: /fpc/8/pfe/0/cm/0/MQSS(0)/0/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR (0x2203cc), scope: pfe, category: functional, severity: major, module: MQSS(0), type: DRD_RORD_ENG_INT: CMD FSM State Error [LOG: Notice] Performing action cmalarm for error /fpc/8/pfe/0/cm/0/MQSS(0)/0/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR (0x2203cc) in module: MQSS(0) with scope: pfe category: functional level: major [LOG: Notice] Performing action get-state for error /fpc/8/pfe/0/cm/0/MQSS(0)/0/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR (0x2203cc) in module: MQSS(0) with scope: pfe category: functional level: major [LOG: Notice] Performing action disable-pfe for error /fpc/8/pfe/0/cm/0/MQSS(0)/0/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR (0x2203cc) in module: MQSS(0) with scope: pfe category: functional level: major By continuously sending fragmented packets that cannot be reassembled, an attacker can repeatedly disable the PFE causing a sustained Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 17.2 versions prior to 17.2R3-S4 on MX Series; 17.3 versions prior to 17.3R3-S8 on MX Series; 17.4 versions prior to 17.4R2-S10, 17.4R3-S2 on MX Series; 18.1 versions prior to 18.1R3-S10 on MX Series; 18.2 versions prior to 18.2R3-S3 on MX Series; 18.2X75 versions prior to 18.2X75-D41, 18.2X75-D430, 18.2X75-D65 on MX Series; 18.3 versions prior to 18.3R1-S7, 18.3R2-S4, 18.3R3-S1 on MX Series; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3 on MX Series; 19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3 on MX Series; 19.2 versions prior to 19.2R1-S4, 19.2R2 on MX Series; 19.3 versions prior to 19.3R2-S2, 19.3R3 on MX Series. This issue is specific to inline IP reassembly, introduced in Junos OS 17.2. Versions of Junos OS prior to 17.2 are unaffected by this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS(MX系列)中存在安全漏洞。攻击者可通过连续发送较大的数据包利用该漏洞造成数据包转发引擎崩溃。以下产品及版本受到影响:Juniper Networks Junos OS 17.2版本,17.3版本,17.4版本,18.1版本,18.2版本,18.2X75版本,
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS unspecified ~ 17.2 -

II. Public POCs for CVE-2020-1655

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1655

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2020-07-17 · 15 CVEs total

CVE-2020-16549.8 CRITICALJunos OS: SRX Series: processing a malformed HTTP message when ICAP redirect service is en
CVE-2020-16479.8 CRITICALJunos OS: SRX Series: Double free vulnerability can lead to DoS or remote code execution d
CVE-2020-16458.3 HIGHJunos OS: MX Series: Services card might restart when DNS filtering is enabled
CVE-2020-16537.5 HIGHJunos OS: Kernel crash (vmcore) or FPC crash due to mbuf leak
CVE-2020-16497.5 HIGHJunos OS: MX Series: PFE crash on MPC7/8/9 upon receipt of small fragments requiring reass
CVE-2020-16507.5 HIGHJunos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-M
CVE-2020-16487.5 HIGHJunos OS and Junos OS Evolved: RPD crash when processing a specific BGP packet
CVE-2020-16467.5 HIGHJunos OS and Junos OS Evolved: RPD crash while processing a specific BGP update informatio
CVE-2020-16447.5 HIGHJunos OS and Junos OS Evolved: RPD crash due to specific BGP UPDATE packets
CVE-2020-16407.5 HIGHJunos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash.
CVE-2020-16516.5 MEDIUMJunos OS: MX Series: PFE on the line card may crash due to memory leak.
CVE-2020-16416.5 MEDIUMJunos OS: A race condition on receipt of crafted LLDP packets leads to a memory leak and a
CVE-2020-16525.6 MEDIUMJunos Space: OpenNMS is accessible via port 9443
CVE-2020-16435.5 MEDIUMJunos OS: EX Series: RPD crash when executing specific "show ospf interface" commands from

IV. Related Vulnerabilities

V. Comments for CVE-2020-1655

No comments yet


Leave a comment