First published: Fri Oct 13 2017(Updated: )
On SRX Series devices, a crafted ICMP packet embedded within a NAT64 IPv6 to IPv4 tunnel may cause the flowd process to crash. Repeated crashes of the flowd process constitutes an extended denial of service condition for the SRX Series device. This issue only occurs if NAT64 is configured. Affected releases are Juniper Networks Junos OS 12.1X46 prior to 12.1X46-D71, 12.3X48 prior to 12.3X48-D55, 15.1X49 prior to 15.1X49-D100 on SRX Series. No other Juniper Networks products or platforms are affected by this issue.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =12.1x46 | |
Juniper JUNOS | =12.1x46-d10 | |
Juniper JUNOS | =12.1x46-d15 | |
Juniper JUNOS | =12.1x46-d20 | |
Juniper JUNOS | =12.1x46-d25 | |
Juniper JUNOS | =12.1x46-d30 | |
Juniper JUNOS | =12.1x46-d35 | |
Juniper JUNOS | =12.1x46-d40 | |
Juniper JUNOS | =12.1x46-d45 | |
Juniper JUNOS | =12.1x46-d50 | |
Juniper JUNOS | =12.1x46-d55 | |
Juniper Srx Series | ||
Juniper JUNOS | =12.3x48-d10 | |
Juniper JUNOS | =12.3x48-d15 | |
Juniper JUNOS | =12.3x48-d20 | |
Juniper JUNOS | =12.3x48-d25 | |
Juniper JUNOS | =12.3x48-d30 | |
Juniper JUNOS | =12.3x48-d35 | |
Juniper JUNOS | =12.3x48-d40 | |
Juniper JUNOS | =12.3x48-d45 | |
Juniper JUNOS | =12.3x48-d50 | |
Juniper JUNOS | =15.1x49-d10 | |
Juniper JUNOS | =15.1x49-d20 | |
Juniper JUNOS | =15.1x49-d30 | |
Juniper JUNOS | =15.1x49-d35 | |
Juniper JUNOS | =15.1x49-d40 | |
Juniper JUNOS | =15.1x49-d45 | |
Juniper JUNOS | =15.1x49-d50 | |
Juniper JUNOS | =15.1x49-d55 | |
Juniper JUNOS | =15.1x49-d60 | |
Juniper JUNOS | =15.1x49-d65 | |
Juniper JUNOS | =15.1x49-d70 | |
Juniper JUNOS | =15.1x49-d75 | |
Juniper JUNOS | =15.1x49-d80 | |
Juniper JUNOS | =15.1x49-d90 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-10610 is categorized as high, due to its potential to cause denial of service on affected devices.
To fix CVE-2017-10610, it is recommended to disable NAT64 or upgrade to a patched version of Junos.
CVE-2017-10610 affects Juniper SRX Series devices running specific versions of Junos with NAT64 configured.
The impact of CVE-2017-10610 is the crashing of the flowd process, leading to extended denial of service for the SRX device.
The primary workaround for CVE-2017-10610 is to disable the NAT64 configuration on affected Juniper devices.