First published: Wed Apr 10 2019(Updated: )
On EX4300-MP Series devices with any lo0 filters applied, transit network traffic may reach the control plane via loopback interface (lo0). The device may fail to forward such traffic. This issue affects Juniper Networks Junos OS 18.2 versions prior to 18.2R1-S2, 18.2R2 on EX4300-MP Series. This issue does not affect any other EX series devices.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Junos OS Evolved | =18.2 | |
Junos OS Evolved | =18.2-r1 | |
Juniper EX4300 |
The following software releases have been updated to resolve this specific issue: 18.2R1-S2, 18.2R2, 18.3R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0041 is a vulnerability found in Juniper Networks Junos OS 18.2 versions prior to 18.2R1-S2, 18.2R2 on EX4300-MP Series devices. It allows transit network traffic to reach the control plane via loopback interface (lo0).
CVE-2019-0041 affects Juniper EX4300-MP Series devices by allowing transit network traffic to reach the control plane via the loopback interface (lo0), which can cause the device to fail to forward such traffic.
The severity of CVE-2019-0041 is high with a severity score of 8.6.
To fix CVE-2019-0041 on Juniper Networks Junos OS 18.2 devices, it is recommended to upgrade to versions 18.2R1-S2 or 18.2R2.
No, Juniper EX4300-MP devices are not vulnerable to CVE-2019-0041.