CWE
20
Advisory Published
Updated

CVE-2018-0060: Junos OS: Invalid IP/mask learned from DHCP server might cause device control daemon (dcd) process crash

First published: Wed Oct 10 2018(Updated: )

An improper input validation weakness in the device control daemon process (dcd) of Juniper Networks Junos OS allows an attacker to cause a Denial of Service to the dcd process and interfaces and connected clients when the Junos device is requesting an IP address for itself. Junos devices are not vulnerable to this issue when not configured to use DHCP. Affected releases are Juniper Networks Junos OS: 12.1X46 versions prior to 12.1X46-D40 on SRX Series; 12.3X48 versions prior to 12.3X48-D20 on SRX Series; 14.1X53 versions prior to 14.1X53-D40 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 15.1X49 versions prior to 15.1X49-D20 on SRX Series; 15.1X53 versions prior to 15.1X53-D68 on QFX10000 Series; 15.1X53 versions prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions prior to 15.1X53-D495 on NFX150, NFX250; 15.1X53 versions prior to 15.1X53-D590 on EX2300/EX3400; 15.1 versions prior to 15.1R7-S2.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Juniper Junos=12.1x46
Juniper Junos=12.1x46-d10
Juniper Junos=12.1x46-d15
Juniper Junos=12.1x46-d20
Juniper Junos=12.1x46-d25
Juniper Junos=12.1x46-d30
Juniper Junos=12.1x46-d35
Juniper Junos=12.1x46-d40
Juniper Junos=12.1x46-d45
Juniper Junos=12.3x48
Juniper Junos=12.3x48-d10
Juniper Junos=12.3x48-d15
Juniper Junos=12.3x48-d20
Juniper Junos=15.1
Juniper Junos=15.1-f2
Juniper Junos=15.1-f3
Juniper Junos=15.1-f4
Juniper Junos=15.1-f5
Juniper Junos=15.1-f6
Juniper Junos=15.1-r1
Juniper Junos=15.1-r2
Juniper Junos=15.1-r3
Juniper Junos=15.1-r6
Juniper Junos=15.1x49
Juniper Junos=15.1x49-d10
Juniper Junos=15.1x49-d110
Juniper Junos=15.1x49-d20
Juniper Junos=15.1x53
Juniper Junos=15.1x53-d50
Juniper Junos=15.1x53-d51
Juniper Junos=15.1x53-d52
Juniper Junos=15.1x53-d55
Juniper Junos=15.1x53-d57
Juniper Junos=15.1x53-d58
Juniper EX2300-24T
Juniper EX3400
Juniper Junos=15.1x53-d10
Juniper Junos=15.1x53-d20
Juniper Junos=15.1x53-d21
Juniper Junos=15.1x53-d30
Juniper Junos=15.1x53-d32
Juniper Junos=15.1x53-d33
Juniper Junos=15.1x53-d34
Juniper Junos=15.1x53-d60
Juniper Junos=15.1x53-d61
Juniper Junos=15.1x53-d62
Juniper Junos=15.1x53-d63
Juniper Junos=15.1x53-d64
Juniper Junos=15.1x53-d65
Juniper Junos=15.1x53-d66
Juniper QFX10000
Juniper Junos=15.1x53-d210
Juniper Junos=15.1x53-d230
Juniper Junos=15.1x53-d231
Juniper Junos=15.1x53-d232
Juniper QFX5110
Juniper QFX5200-48Y
Juniper Junos=15.1x53-d40
Juniper Junos=15.1x53-d45
Juniper Junos=15.1x53-d490
Juniper NFX
Juniper Junos=14.1x53
Juniper Junos=14.1x53-d10
Juniper Junos=14.1x53-d15
Juniper Junos=14.1x53-d16
Juniper Junos=14.1x53-d25
Juniper Junos=14.1x53-d26
Juniper Junos=14.1x53-d27
Juniper Junos=14.1x53-d30
Juniper Junos=14.1x53-d35
Juniper EX3200
Juniper EX Series
Juniper EX4300-24T
Juniper EX4600
Juniper EX6200
Juniper QFX3500
Juniper QFX3600-I
Juniper QFX5100

Remedy

The following software releases have been updated to resolve this specific issue: 12.1X46-D40, 12.3X48-D20, 14.1X53-D40, 15.1X49-D20, 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590, 15.1R7-S2, 16.1R1and all subsequent releases.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-0060?

    CVE-2018-0060 has a medium severity rating due to its potential to cause a denial of service.

  • How do I fix CVE-2018-0060?

    To fix CVE-2018-0060, apply the recommended firmware updates provided by Juniper Networks for affected Junos OS versions.

  • Which Junos OS versions are affected by CVE-2018-0060?

    CVE-2018-0060 affects Junos OS versions including 12.1x46 and 15.1x53, among others.

  • What is the impact of CVE-2018-0060 on my network?

    The impact of CVE-2018-0060 can lead to denial of service, disrupting network services and connectivity.

  • Is CVE-2018-0060 exploitable from a remote network?

    Yes, an attacker on a remote network can exploit CVE-2018-0060 to trigger the denial of service condition.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203