First published: Wed Apr 10 2019(Updated: )
When configuring a stateless firewall filter in Junos OS, terms named using the format "internal-n" (e.g. "internal-1", "internal-2", etc.) are silently ignored. No warning is issued during configuration, and the config is committed without error, but the filter criteria will match all packets leading to unexpected results. Affected releases are Juniper Networks Junos OS: All versions prior to and including 12.3; 14.1X53 versions prior to 14.1X53-D130, 14.1X53-D49; 15.1 versions prior to 15.1F6-S12, 15.1R7-S4; 15.1X49 versions prior to 15.1X49-D161, 15.1X49-D170; 15.1X53 versions prior to 15.1X53-D236, 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4, 16.1R7-S5; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S7, 17.4R2-S3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S1; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3; 18.4 versions prior to 18.4R1-S1, 18.4R1-S2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | =15.1 | |
Junos OS Evolved | =15.1-f1 | |
Junos OS Evolved | =15.1-f2 | |
Junos OS Evolved | =15.1-f3 | |
Junos OS Evolved | =15.1-f4 | |
Junos OS Evolved | =15.1-f5 | |
Junos OS Evolved | =15.1-f6 | |
Junos OS Evolved | =15.1-r1 | |
Junos OS Evolved | =15.1-r2 | |
Junos OS Evolved | =15.1-r3 | |
Junos OS Evolved | =15.1-r4 | |
Junos OS Evolved | =15.1-r5 | |
Junos OS Evolved | =15.1-r6 | |
Junos OS Evolved | =15.1f6-s1-f6 | |
Junos OS Evolved | =15.1f6-s2-f6 | |
Junos OS Evolved | =15.1f6-s4-f6 | |
Junos OS Evolved | =15.1f6-s5-f6 | |
Junos OS Evolved | =15.1f6-s6-f6 | |
Junos OS Evolved | =15.1f6-s7-f6 | |
Junos OS Evolved | =15.1f6-s8-f6 | |
Junos OS Evolved | =15.1f6-s9-f6 | |
Junos OS Evolved | =15.1f6-s10-f6 | |
Junos OS Evolved | =15.1f6-s11-f6 | |
Junos OS Evolved | =15.1x49-d10 | |
Junos OS Evolved | =15.1x49-d100 | |
Junos OS Evolved | =15.1x49-d110 | |
Junos OS Evolved | =15.1x49-d120 | |
Junos OS Evolved | =15.1x49-d130 | |
Junos OS Evolved | =15.1x49-d150 | |
Junos OS Evolved | =15.1x49-d20 | |
Junos OS Evolved | =15.1x49-d30 | |
Junos OS Evolved | =15.1x49-d35 | |
Junos OS Evolved | =15.1x49-d40 | |
Junos OS Evolved | =15.1x49-d45 | |
Junos OS Evolved | =15.1x49-d50 | |
Junos OS Evolved | =15.1x49-d55 | |
Junos OS Evolved | =15.1x49-d60 | |
Junos OS Evolved | =15.1x49-d65 | |
Junos OS Evolved | =15.1x49-d70 | |
Junos OS Evolved | =15.1x49-d75 | |
Junos OS Evolved | =15.1x49-d80 | |
Junos OS Evolved | =15.1x49-d90 | |
Junos OS Evolved | =15.1x53-d10 | |
Junos OS Evolved | =15.1x53-d20 | |
Junos OS Evolved | =15.1x53-d21 | |
Junos OS Evolved | =15.1x53-d210 | |
Junos OS Evolved | =15.1x53-d230 | |
Junos OS Evolved | =15.1x53-d231 | |
Junos OS Evolved | =15.1x53-d232 | |
Junos OS Evolved | =15.1x53-d233 | |
Junos OS Evolved | =15.1x53-d25 | |
Junos OS Evolved | =15.1x53-d30 | |
Junos OS Evolved | =15.1x53-d32 | |
Junos OS Evolved | =15.1x53-d33 | |
Junos OS Evolved | =15.1x53-d34 | |
Junos OS Evolved | =15.1x53-d40 | |
Junos OS Evolved | =15.1x53-d45 | |
Junos OS Evolved | =15.1x53-d495 | |
Junos OS Evolved | =15.1x53-d56 | |
Junos OS Evolved | =15.1x53-d60 | |
Junos OS Evolved | =15.1x53-d61 | |
Junos OS Evolved | =15.1x53-d62 | |
Junos OS Evolved | =15.1x53-d63 | |
Junos OS Evolved | =16.1-r1 | |
Junos OS Evolved | =16.1-r2 | |
Junos OS Evolved | =16.1-r3 | |
Junos OS Evolved | =16.1-r4 | |
Junos OS Evolved | =16.1-r5 | |
Junos OS Evolved | =16.1-r6 | |
Junos OS Evolved | =16.1-r7 | |
Junos OS Evolved | =17.3-r1 | |
Junos OS Evolved | =17.3-r2 | |
Junos OS Evolved | =17.3-r3 | |
Junos OS Evolved | =17.3-r3-s1 | |
Junos OS Evolved | =17.3-r3-s2 | |
Junos OS Evolved | =17.3-r3-s3 | |
Junos OS Evolved | =17.2-r1 | |
Junos OS Evolved | =17.2-r1-s7 | |
Junos OS Evolved | =17.2-r2 | |
Junos OS Evolved | =17.2-r3 | |
Junos OS Evolved | =17.4-r1 | |
Junos OS Evolved | =17.4-r2 | |
Junos OS Evolved | =18.1-r1 | |
Junos OS Evolved | =18.1-r2 | |
Junos OS Evolved | =18.2-r1 | |
Junos OS Evolved | =18.2-r1-s3 | |
Junos OS Evolved | =18.2-r2-s1 | |
Junos OS Evolved | =18.2-r2-s2 | |
Junos OS Evolved | =18.3-r1-s1 | |
Junos OS Evolved | =18.2x75 | |
Junos OS Evolved | <=12.3 | |
Junos OS Evolved | =14.1x53 | |
Junos OS Evolved | =14.1x53-d10 | |
Junos OS Evolved | =14.1x53-d15 | |
Junos OS Evolved | =14.1x53-d16 | |
Junos OS Evolved | =14.1x53-d25 | |
Junos OS Evolved | =14.1x53-d26 | |
Junos OS Evolved | =14.1x53-d27 | |
Junos OS Evolved | =14.1x53-d30 | |
Junos OS Evolved | =14.1x53-d35 | |
Junos OS Evolved | =14.1x53-d40 | |
Junos OS Evolved | =14.1x53-d42 | |
Junos OS Evolved | =14.1x53-d43 | |
Junos OS Evolved | =14.1x53-d44 | |
Junos OS Evolved | =14.1x53-d45 | |
Junos OS Evolved | =14.1x53-d46 | |
Junos OS Evolved | =14.1x53-d47 | |
Junos OS Evolved | =14.1x53-d48 | |
Junos OS Evolved | =18.4-r1 |
The following software releases have been updated to resolve this specific issue: Junos OS 14.1X53-D130, 14.1X53-D49, 15.1F6-S12, 15.1R7-S4, 15.1X49-D161, 15.1X49-D170, 15.1X53-D236, 15.1X53-D496, 15.1X53-D69, 16.1R7-S4, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R3-S1, 17.3R3-S4, 17.4R1-S7, 17.4R2-S3, 18.1R2-S4, 18.1R3-S4, 18.2R1-S5, 18.2R2-S1, 18.2X75-D40, 18.3R1-S3, 18.4R1-S1, 19.1R1, and all subsequent releases. Note: Fixes are not available for Junos OS 12.1X46, 12.3X48, or 12.3R12 due to the high risk of making changes to earlier releases, and the easily implemented available workaround.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0036 has a High severity rating as it involves silently ignoring critical firewall filter configurations.
To fix CVE-2019-0036, upgrade your Junos OS to a version where this issue has been addressed as specified in the vendor's security advisories.
CVE-2019-0036 affects multiple versions of Junos OS, including but not limited to 15.1 through 18.4.
Currently, there are no effective workarounds for CVE-2019-0036; updating to the latest version is recommended.
CVE-2019-0036 may lead to unauthorized traffic being allowed through the network due to misconfigured firewall filters, posing a security risk.