7.5
CWE
200
Advisory Published
Updated

CVE-2018-0018: SRX Series: A crafted packet may lead to information disclosure and firewall rule bypass during compilation of IDP policies.

First published: Wed Apr 11 2018(Updated: )

On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other internal devices, systems or services protected by the SRX Series device. This issue only applies to devices where IDP policies are applied to one or more rules. Customers not using IDP policies are not affected. Depending on if the IDP updates are automatic or not, as well as the interval between available updates, an attacker may have more or less success in performing reconnaissance or bypass attacks on the victim SRX Series device or protected devices. ScreenOS with IDP is not vulnerable to this issue. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D60 on SRX; 12.3X48 versions prior to 12.3X48-D35 on SRX; 15.1X49 versions prior to 15.1X49-D60 on SRX.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=12.1x46
Junos OS Evolved=12.1x46-d10
Junos OS Evolved=12.1x46-d15
Junos OS Evolved=12.1x46-d20
Junos OS Evolved=12.1x46-d25
Junos OS Evolved=12.1x46-d30
Junos OS Evolved=12.1x46-d35
Junos OS Evolved=12.1x46-d40
Junos OS Evolved=12.1x46-d45
Junos OS Evolved=12.1x46-d50
Junos OS Evolved=12.1x46-d55
Juniper SRX100
Juniper SRX110
Juniper SRX1400
Juniper SRX1500
Juniper SRX210
Juniper SRX220
Juniper SRX240
Juniper SRX300
Juniper SRX320
Juniper SRX340
Juniper SRX3400
Juniper SRX345
Juniper SRX3600
Juniper SRX4100
Juniper SRX4200
Juniper SRX5400
Juniper SRX550
Juniper SRX5600
Juniper SRX5800
Juniper SRX650
Junos OS Evolved=12.3x48
Junos OS Evolved=12.3x48-d10
Junos OS Evolved=12.3x48-d15
Junos OS Evolved=12.3x48-d20
Junos OS Evolved=12.3x48-d25
Junos OS Evolved=12.3x48-d30
Junos OS Evolved=15.1x49
Junos OS Evolved=15.1x49-d10
Junos OS Evolved=15.1x49-d20
Junos OS Evolved=15.1x49-d30
Junos OS Evolved=15.1x49-d35
Junos OS Evolved=15.1x49-d40
Junos OS Evolved=15.1x49-d45
Junos OS Evolved=15.1x49-d50

Remedy

The following software releases have been updated to resolve this specific issue: 12.1X46-D60, 12.3X48-D35, 15.1X49-D60, 17.3R1, and all subsequent releases. Additionally, customers should download and apply the latest sigpack for IDP signatures.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-0018?

    CVE-2018-0018 has been classified with a high severity, as it allows attackers to bypass firewall rules.

  • How does CVE-2018-0018 exploit the system?

    CVE-2018-0018 exploits specially crafted packets to compromise the firewall policies during IDP policy compilation.

  • What versions of Juniper JUNOS are affected by CVE-2018-0018?

    Affected versions include Junos 12.1x46, 12.3x48, and 15.1x49 among others.

  • How do I fix CVE-2018-0018?

    To mitigate CVE-2018-0018, you should upgrade to the latest patched version of Junos firmware.

  • What are the potential consequences of CVE-2018-0018?

    CVE-2018-0018 can lead to information disclosure that may enable an attacker to gain control over the device or internal network.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203