
30/5/2017

5/8/2024
CVE-2017-2302
First published: Tue May 30 2017(Updated: )
On Juniper Networks products or platforms running Junos OS 12.1X46 prior to 12.1X46-D55, 12.1X47 prior to 12.1X47-D45, 12.3R13 prior to 12.3R13, 12.3X48 prior to 12.3X48-D35, 13.3 prior to 13.3R10, 14.1 prior to 14.1R8, 14.1X53 prior to 14.1X53-D40, 14.1X55 prior to 14.1X55-D35, 14.2 prior to 14.2R6, 15.1 prior to 15.1F2 or 15.1R1, 15.1X49 prior to 15.1X49-D20 where the BGP add-path feature is enabled with 'send' option or with both 'send' and 'receive' options, a network based attacker can cause the Junos OS rpd daemon to crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|
Juniper Junos | =12.1x46 | |
Juniper Junos | =12.1x46-d10 | |
Juniper Junos | =12.1x46-d15 | |
Juniper Junos | =12.1x46-d20 | |
Juniper Junos | =12.1x46-d25 | |
Juniper Junos | =12.1x46-d30 | |
Juniper Junos | =12.1x46-d35 | |
Juniper Junos | =12.1x46-d40 | |
Juniper Junos | =12.1x46-d45 | |
Juniper Junos | =12.1x46-d50 | |
Juniper Junos | =12.1x47 | |
Juniper Junos | =12.1x47-d10 | |
Juniper Junos | =12.1x47-d15 | |
Juniper Junos | =12.1x47-d20 | |
Juniper Junos | =12.1x47-d25 | |
Juniper Junos | =12.1x47-d30 | |
Juniper Junos | =12.1x47-d35 | |
Juniper Junos | =12.1x47-d40 | |
Juniper Junos | =12.3 | |
Juniper Junos | =12.3-r1 | |
Juniper Junos | =12.3-r11 | |
Juniper Junos | =12.3-r12 | |
Juniper Junos | =12.3-r2 | |
Juniper Junos | =12.3-r3 | |
Juniper Junos | =12.3-r4 | |
Juniper Junos | =12.3-r5 | |
Juniper Junos | =12.3-r6 | |
Juniper Junos | =12.3-r7 | |
Juniper Junos | =12.3-r8 | |
Juniper Junos | =12.3-r9 | |
Juniper Junos | =12.3x48 | |
Juniper Junos | =12.3x48-d10 | |
Juniper Junos | =12.3x48-d15 | |
Juniper Junos | =12.3x48-d25 | |
Juniper Junos | =13.3 | |
Juniper Junos | =13.3-r1 | |
Juniper Junos | =13.3-r2 | |
Juniper Junos | =13.3-r3 | |
Juniper Junos | =13.3-r4 | |
Juniper Junos | =13.3-r5 | |
Juniper Junos | =13.3-r6 | |
Juniper Junos | =13.3-r7 | |
Juniper Junos | =13.3-r8 | |
Juniper Junos | =13.3-r9 | |
Juniper Junos | =14.1 | |
Juniper Junos | =14.1-r1 | |
Juniper Junos | =14.1-r2 | |
Juniper Junos | =14.1-r3 | |
Juniper Junos | =14.1-r4 | |
Juniper Junos | =14.1-r5 | |
Juniper Junos | =14.1-r6 | |
Juniper Junos | =14.1-r7 | |
Juniper Junos | =14.1x53 | |
Juniper Junos | =14.1x53-d10 | |
Juniper Junos | =14.1x53-d15 | |
Juniper Junos | =14.1x53-d16 | |
Juniper Junos | =14.1x53-d25 | |
Juniper Junos | =14.1x53-d26 | |
Juniper Junos | =14.1x53-d27 | |
Juniper Junos | =14.1x53-d30 | |
Juniper Junos | =14.1x53-d35 | |
Juniper Junos | =14.1x55 | |
Juniper Junos | =14.1x55-d16 | |
Juniper Junos | =14.1x55-d20 | |
Juniper Junos | =14.1x55-d25 | |
Juniper Junos | =14.1x55-d30 | |
Juniper Junos | =15.1 | |
Juniper Junos | =15.1-f1 | |
Juniper Junos | =15.1-r1 | |
Juniper Junos | =15.1x49 | |
Juniper Junos | =15.1x49-d10 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2017-2302?
The CVE-2017-2302 vulnerability has been rated as high severity due to potential impacts on the security and integrity of affected systems.
How do I fix CVE-2017-2302?
To remediate CVE-2017-2302, update the affected Junos OS versions to the patched versions specified in the vendor's advisory.
What products are affected by CVE-2017-2302?
CVE-2017-2302 affects multiple versions of Junos OS, including 12.1X46, 12.1X47, and 14.1, among others.
What types of attacks can exploit CVE-2017-2302?
CVE-2017-2302 can be exploited by authenticated attackers to potentially gain unauthorized access or control over affected devices.
Is CVE-2017-2302 being actively exploited in the wild?
As of the information available, there are no confirmed reports of active exploitation of CVE-2017-2302.
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/references
- agent/severity
- agent/last-modified-date
- agent/author
- agent/description
- agent/first-publish-date
- agent/event
- agent/source
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- vendor/juniper
- canonical/juniper junos
- version/juniper junos/12.1x46
- version/juniper junos/12.1x46-d10
- version/juniper junos/12.1x46-d15
- version/juniper junos/12.1x46-d20
- version/juniper junos/12.1x46-d25
- version/juniper junos/12.1x46-d30
- version/juniper junos/12.1x46-d35
- version/juniper junos/12.1x46-d40
- version/juniper junos/12.1x46-d45
- version/juniper junos/12.1x46-d50
- version/juniper junos/12.1x47
- version/juniper junos/12.1x47-d10
- version/juniper junos/12.1x47-d15
- version/juniper junos/12.1x47-d20
- version/juniper junos/12.1x47-d25
- version/juniper junos/12.1x47-d30
- version/juniper junos/12.1x47-d35
- version/juniper junos/12.1x47-d40
- version/juniper junos/12.3
- version/juniper junos/12.3-r1
- version/juniper junos/12.3-r11
- version/juniper junos/12.3-r12
- version/juniper junos/12.3-r2
- version/juniper junos/12.3-r3
- version/juniper junos/12.3-r4
- version/juniper junos/12.3-r5
- version/juniper junos/12.3-r6
- version/juniper junos/12.3-r7
- version/juniper junos/12.3-r8
- version/juniper junos/12.3-r9
- version/juniper junos/12.3x48
- version/juniper junos/12.3x48-d10
- version/juniper junos/12.3x48-d15
- version/juniper junos/12.3x48-d25
- version/juniper junos/13.3
- version/juniper junos/13.3-r1
- version/juniper junos/13.3-r2
- version/juniper junos/13.3-r3
- version/juniper junos/13.3-r4
- version/juniper junos/13.3-r5
- version/juniper junos/13.3-r6
- version/juniper junos/13.3-r7
- version/juniper junos/13.3-r8
- version/juniper junos/13.3-r9
- version/juniper junos/14.1
- version/juniper junos/14.1-r1
- version/juniper junos/14.1-r2
- version/juniper junos/14.1-r3
- version/juniper junos/14.1-r4
- version/juniper junos/14.1-r5
- version/juniper junos/14.1-r6
- version/juniper junos/14.1-r7
- version/juniper junos/14.1x53
- version/juniper junos/14.1x53-d10
- version/juniper junos/14.1x53-d15
- version/juniper junos/14.1x53-d16
- version/juniper junos/14.1x53-d25
- version/juniper junos/14.1x53-d26
- version/juniper junos/14.1x53-d27
- version/juniper junos/14.1x53-d30
- version/juniper junos/14.1x53-d35
- version/juniper junos/14.1x55
- version/juniper junos/14.1x55-d16
- version/juniper junos/14.1x55-d20
- version/juniper junos/14.1x55-d25
- version/juniper junos/14.1x55-d30
- version/juniper junos/15.1
- version/juniper junos/15.1-f1
- version/juniper junos/15.1-r1
- version/juniper junos/15.1x49
- version/juniper junos/15.1x49-d10
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203