First published: Tue Jan 15 2019(Updated: )
The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =15.1 | |
Juniper JUNOS | =15.1-f1 | |
Juniper JUNOS | =15.1-f2 | |
Juniper JUNOS | =15.1-f3 | |
Juniper JUNOS | =15.1-f4 | |
Juniper JUNOS | =15.1-f5 | |
Juniper Mx10 | ||
Juniper Mx10003 | ||
Juniper Mx10008 | ||
Juniper Mx104 | ||
Juniper Mx150 | ||
Juniper Mx2008 | ||
Juniper Mx2010 | ||
Juniper Mx2020 | ||
Juniper Mx204 | ||
Juniper Mx240 | ||
Juniper Mx40 | ||
Juniper Mx480 | ||
Juniper Mx5 | ||
Juniper Mx80 | ||
Juniper Mx960 | ||
Juniper Vmx |
The following software releases have been updated to resolve this specific issue: 15.1F5, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0007 is a vulnerability in the vMX Series software that allows for predictable IP ID sequence numbers, leaving the system and connected clients susceptible to attacks.
CVE-2019-0007 has a severity rating of 10, which is classified as critical.
CVE-2019-0007 affects Juniper JUNOS versions 15.1 through 15.1-f5.
To fix CVE-2019-0007, it is recommended to apply the necessary software updates provided by Juniper.
More information about CVE-2019-0007 can be found at the following references: [Link 1](http://www.securityfocus.com/bid/106564) and [Link 2](https://kb.juniper.net/JSA10903).