CWE
20
Advisory Published
Updated

CVE-2018-0019: Junos: Denial of service vulnerability in SNMP MIB-II subagent daemon (mib2d).

First published: Wed Apr 11 2018(Updated: )

A vulnerability in Junos OS SNMP MIB-II subagent daemon (mib2d) may allow a remote network based attacker to cause the mib2d process to crash resulting in a denial of service condition (DoS) for the SNMP subsystem. While a mib2d process crash can disrupt the network monitoring via SNMP, it does not impact routing, switching or firewall functionalities. SNMP is disabled by default on devices running Junos OS. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D76; 12.3 versions prior to 12.3R12-S7, 12.3R13; 12.3X48 versions prior to 12.3X48-D65; 14.1 versions prior to 14.1R9; 14.1X53 versions prior to 14.1X53-D130; 15.1 versions prior to 15.1F2-S20, 15.1F6-S10, 15.1R7; 15.1X49 versions prior to 15.1X49-D130; 15.1X53 versions prior to 15.1X53-D233, 15.1X53-D471, 15.1X53-D472, 15.1X53-D58, 15.1X53-D66; 16.1 versions prior to 16.1R5-S3, 16.1R7; 16.1X65 versions prior to 16.1X65-D47; 16.1X70 versions prior to 16.1X70-D10; 16.2 versions prior to 16.2R1-S6, 16.2R2-S5, 16.2R3; 17.1 versions prior to 17.1R2-S6, 17.1R3;

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=15.1x49
Junos OS Evolved=15.1x49-d10
Junos OS Evolved=15.1x49-d100
Junos OS Evolved=15.1x49-d110
Junos OS Evolved=15.1x49-d120
Junos OS Evolved=15.1x49-d20
Junos OS Evolved=15.1x49-d30
Junos OS Evolved=15.1x49-d35
Junos OS Evolved=15.1x49-d40
Junos OS Evolved=15.1x49-d45
Junos OS Evolved=15.1x49-d50
Junos OS Evolved=15.1x49-d55
Junos OS Evolved=15.1x49-d60
Junos OS Evolved=15.1x49-d65
Junos OS Evolved=15.1x49-d70
Junos OS Evolved=15.1x49-d75
Junos OS Evolved=15.1x49-d80
Junos OS Evolved=15.1x49-d90
Junos OS Evolved=14.1
Junos OS Evolved=14.1-r1
Junos OS Evolved=14.1-r2
Junos OS Evolved=14.1-r3
Junos OS Evolved=14.1-r4
Junos OS Evolved=14.1-r5
Junos OS Evolved=14.1-r6
Junos OS Evolved=14.1-r7
Junos OS Evolved=14.1-r8
Junos OS Evolved=14.1x53
Junos OS Evolved=14.1x53-d15
Junos OS Evolved=14.1x53-d16
Junos OS Evolved=14.1x53-d25
Junos OS Evolved=14.1x53-d26
Junos OS Evolved=14.1x53-d27
Junos OS Evolved=14.1x53-d30
Junos OS Evolved=14.1x53-d35
Junos OS Evolved=14.1x53-d40
Junos OS Evolved=14.1x53-d42
Junos OS Evolved=14.1x53-d43
Junos OS Evolved=14.1x53-d44
Junos OS Evolved=14.1x53-d45
Junos OS Evolved=14.1x53-d46
Juniper EX4300-24T
Juniper EX4600
Juniper QFX5100
Junos OS Evolved=15.1x53
Junos OS Evolved=15.1x53-d10
Junos OS Evolved=15.1x53-d20
Junos OS Evolved=15.1x53-d21
Junos OS Evolved=15.1x53-d30
Junos OS Evolved=15.1x53-d32
Junos OS Evolved=15.1x53-d33
Junos OS Evolved=15.1x53-d34
Junos OS Evolved=15.1x53-d50
Junos OS Evolved=15.1x53-d51
Junos OS Evolved=15.1x53-d52
Junos OS Evolved=15.1x53-d55
Junos OS Evolved=15.1x53-d57
Juniper EX2300-24T
Juniper EX3400
Junos OS Evolved=16.1-r1
Junos OS Evolved=16.1-r2
Junos OS Evolved=16.1-r3
Junos OS Evolved=16.1-r4
Junos OS Evolved=16.1-r5
Junos OS Evolved=16.2-r1
Junos OS Evolved=16.2-r2
Junos OS Evolved=16.2-r3
Junos OS Evolved=17.1-r1
Junos OS Evolved=17.1-r2
Junos OS Evolved=17.1-r3
Junos OS Evolved=15.1
Junos OS Evolved=15.1-r1
Junos OS Evolved=15.1-r2
Junos OS Evolved=15.1-r3
Junos OS Evolved=15.1-r4
Junos OS Evolved=15.1-r6
Junos OS Evolved=12.1x46
Junos OS Evolved=12.1x46-d10
Junos OS Evolved=12.1x46-d15
Junos OS Evolved=12.1x46-d20
Junos OS Evolved=12.1x46-d25
Junos OS Evolved=12.1x46-d30
Junos OS Evolved=12.1x46-d35
Junos OS Evolved=12.1x46-d40
Junos OS Evolved=12.1x46-d45
Junos OS Evolved=12.1x46-d50
Junos OS Evolved=12.1x46-d55
Junos OS Evolved=12.1x46-d60
Junos OS Evolved=12.1x46-d65
Junos OS Evolved=12.3x48
Junos OS Evolved=12.3x48-d10
Junos OS Evolved=12.3x48-d15
Junos OS Evolved=12.3x48-d20
Junos OS Evolved=12.3x48-d25
Junos OS Evolved=12.3x48-d30
Junos OS Evolved=12.3x48-d35
Junos OS Evolved=12.3x48-d40
Junos OS Evolved=12.3x48-d45
Junos OS Evolved=12.3x48-d50
Junos OS Evolved=12.3x48-d55
Junos OS Evolved=12.3x48-d60
Junos OS Evolved=14.2
Junos OS Evolved=14.2-r1
Junos OS Evolved=14.2-r2
Junos OS Evolved=14.2-r3
Junos OS Evolved=14.2-r4
Junos OS Evolved=14.2-r5
Junos OS Evolved=14.2-r6
Junos OS Evolved=14.2-r7
Junos OS Evolved=15.1-f1
Junos OS Evolved=15.1-f2
Junos OS Evolved=15.1-f3
Junos OS Evolved=15.1-f4
Junos OS Evolved=15.1-f6
Junos OS Evolved=15.1x53-d210
Junos OS Evolved=15.1x53-d230
Junos OS Evolved=15.1x53-d231
Junos OS Evolved=15.1x53-d232
Junos OS Evolved=15.1x53-d58
Junos OS Evolved=15.1x53-d60
Junos OS Evolved=15.1x53-d61
Junos OS Evolved=15.1x53-d62
Junos OS Evolved=15.1x53-d63
Junos OS Evolved=15.1x53-d64
Junos OS Evolved=15.1x53-d65
Junos OS Evolved=15.1x53-d66
Juniper QFX5110
Juniper QFX5200-32C
Junos OS Evolved=15.1x53-d233
Junos OS Evolved=15.1x53-d470
Juniper NFX
Juniper NFX
Juniper QFX10
Junos OS Evolved=17.2-r1
Junos OS Evolved=17.2-r2
Junos OS Evolved=12.3-r1
Junos OS Evolved=12.3-r10
Junos OS Evolved=12.3-r11
Junos OS Evolved=12.3-r12
Junos OS Evolved=12.3-r2
Junos OS Evolved=12.3-r3
Junos OS Evolved=12.3-r4
Junos OS Evolved=12.3-r5
Junos OS Evolved=12.3-r6
Junos OS Evolved=12.3-r7
Junos OS Evolved=12.3-r8
Junos OS Evolved=12.3-r9
Junos OS Evolved=14.1x53-d121
Juniper Qfabric
Junos OS Evolved=16.1x65-d30
Junos OS Evolved=16.1x65-d35
Junos OS Evolved=16.1x65-d40
Junos OS Evolved=16.1x70

Remedy

The following software releases have been updated to resolve this specific issue:12.3R12-S7, 12.3R13, 12.3X48-D65, 14.1R9, 14.1X53-D130, 15.1F2-S20, 15.1F6-S10, 15.1R7, 15.1X49-D130, 15.1X53-D233, 15.1X53-D471, 15.1X53-D472, 15.1X53-D58, 15.1X53-D66, 16.1R5-S3, 16.1R7, 16.1X65-D47, 16.1X70-D10, 16.2R1-S6, 16.2R2-S5, 16.2R3, 17.1R2-S6, 17.1R3, 17.2R1, and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-0019?

    CVE-2018-0019 has a medium severity rating because it may lead to denial of service for the SNMP subsystem.

  • How do I fix CVE-2018-0019?

    To mitigate CVE-2018-0019, upgrade to a non-vulnerable version of Junos OS as advised in security advisories from Juniper.

  • Which versions of Junos OS are affected by CVE-2018-0019?

    CVE-2018-0019 affects several versions of Junos OS, including 15.1x49 and various revisions of 14.1 and 16.1.

  • Can CVE-2018-0019 be exploited remotely?

    Yes, CVE-2018-0019 can be exploited remotely by an attacker to crash the mib2d process.

  • What impact does CVE-2018-0019 have on network operations?

    CVE-2018-0019 can disrupt network monitoring capabilities due to the denial of service condition.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203