First published: Wed Oct 09 2019(Updated: )
An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet is first de-encapsulated from an encapsulated format by a receiving device. Continued receipt of the malformed packet will result in a sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS 15.1 versions prior to 15.1F6-S12, 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D150 on SRX Series; 15.1X53 versions prior to 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =15.1-a1 | |
Juniper JUNOS | =15.1-f1 | |
Juniper JUNOS | =15.1-f2 | |
Juniper JUNOS | =15.1-f2-s1 | |
Juniper JUNOS | =15.1-f2-s2 | |
Juniper JUNOS | =15.1-f2-s3 | |
Juniper JUNOS | =15.1-f2-s4 | |
Juniper JUNOS | =15.1-f3 | |
Juniper JUNOS | =15.1-f4 | |
Juniper JUNOS | =15.1-f5 | |
Juniper JUNOS | =15.1-f6 | |
Juniper JUNOS | =15.1-f6-s3 | |
Juniper JUNOS | =15.1-r1 | |
Juniper JUNOS | =15.1-r2 | |
Juniper JUNOS | =15.1-r3 | |
Juniper JUNOS | =15.1-r4 | |
Juniper JUNOS | =15.1-r4-s9 | |
Juniper JUNOS | =15.1-r5 | |
Juniper JUNOS | =15.1-r6 | |
Juniper JUNOS | =15.1-r6-s6 | |
Juniper JUNOS | =15.1-r7-s1 | |
Juniper JUNOS | =15.1x49-d10 | |
Juniper JUNOS | =15.1x49-d100 | |
Juniper JUNOS | =15.1x49-d110 | |
Juniper JUNOS | =15.1x49-d120 | |
Juniper JUNOS | =15.1x49-d130 | |
Juniper JUNOS | =15.1x49-d140 | |
Juniper JUNOS | =15.1x49-d20 | |
Juniper JUNOS | =15.1x49-d30 | |
Juniper JUNOS | =15.1x49-d35 | |
Juniper JUNOS | =15.1x49-d40 | |
Juniper JUNOS | =15.1x49-d45 | |
Juniper JUNOS | =15.1x49-d50 | |
Juniper JUNOS | =15.1x49-d55 | |
Juniper JUNOS | =15.1x49-d60 | |
Juniper JUNOS | =15.1x49-d65 | |
Juniper JUNOS | =15.1x49-d70 | |
Juniper JUNOS | =15.1x49-d75 | |
Juniper JUNOS | =15.1x49-d80 | |
Juniper JUNOS | =15.1x49-d90 | |
Juniper Csrx | ||
Juniper SRX100 | ||
Juniper SRX110 | ||
Juniper SRX1400 | ||
Juniper SRX1500 | ||
Juniper SRX210 | ||
Juniper SRX220 | ||
Juniper SRX240 | ||
Juniper SRX300 | ||
Juniper SRX320 | ||
Juniper SRX340 | ||
Juniper SRX3400 | ||
Juniper SRX345 | ||
Juniper SRX3600 | ||
Juniper SRX4100 | ||
Juniper SRX4200 | ||
Juniper SRX4600 | ||
Juniper SRX5400 | ||
Juniper SRX550 | ||
Juniper SRX550 | ||
juniper srx5600 | ||
Juniper SRX5800 | ||
Juniper SRX650 | ||
Juniper vSRX | ||
Juniper JUNOS | =15.1x53-d20 | |
Juniper JUNOS | =15.1x53-d21 | |
Juniper JUNOS | =15.1x53-d210 | |
Juniper JUNOS | =15.1x53-d230 | |
Juniper JUNOS | =15.1x53-d231 | |
Juniper JUNOS | =15.1x53-d232 | |
Juniper JUNOS | =15.1x53-d233 | |
Juniper JUNOS | =15.1x53-d234 | |
Juniper JUNOS | =15.1x53-d235 | |
Juniper JUNOS | =15.1x53-d236 | |
Juniper JUNOS | =15.1x53-d237 | |
Juniper JUNOS | =15.1x53-d25 | |
Juniper JUNOS | =15.1x53-d30 | |
Juniper JUNOS | =15.1x53-d31 | |
Juniper JUNOS | =15.1x53-d32 | |
Juniper JUNOS | =15.1x53-d33 | |
Juniper JUNOS | =15.1x53-d34 | |
Juniper JUNOS | =15.1x53-d40 | |
Juniper JUNOS | =15.1x53-d45 | |
Juniper JUNOS | =15.1x53-d470 | |
Juniper JUNOS | =15.1x53-d495 | |
Juniper JUNOS | =15.1x53-d56 | |
Juniper JUNOS | =15.1x53-d59 | |
Juniper JUNOS | =15.1x53-d60 | |
Juniper JUNOS | =15.1x53-d61 | |
Juniper JUNOS | =15.1x53-d62 | |
Juniper JUNOS | =15.1x53-d63 | |
Juniper JUNOS | =15.1x53-d64 | |
Juniper JUNOS | =15.1x53-d65 | |
Juniper JUNOS | =15.1x53-d66 | |
Juniper JUNOS | =15.1x53-d69 | |
Juniper JUNOS | =15.1x53-d70 | |
Juniper JUNOS | =16.1 | |
Juniper JUNOS | =16.1-r1 | |
Juniper JUNOS | =16.1-r2 | |
Juniper JUNOS | =16.1-r3 | |
Juniper JUNOS | =16.1-r4 | |
Juniper JUNOS | =16.1-r5 | |
Juniper JUNOS | =16.1-r5-s4 | |
Juniper JUNOS | =16.1-r6 | |
Juniper JUNOS | =16.1-r6-s1 | |
Juniper JUNOS | =16.1-r7 | |
Juniper JUNOS | =16.2 | |
Juniper JUNOS | =16.2-r1 | |
Juniper JUNOS | =16.2-r2 | |
Juniper JUNOS | =16.2-r2-s1 | |
Juniper JUNOS | =16.2-r2-s2 | |
Juniper JUNOS | =16.2-r2-s5 | |
Juniper JUNOS | =16.2-r2-s6 | |
Juniper JUNOS | =17.1 | |
Juniper JUNOS | =17.1-r1 | |
Juniper JUNOS | =17.1-r2-s1 | |
Juniper JUNOS | =17.1-r2-s2 | |
Juniper JUNOS | =17.1-r2-s3 | |
Juniper JUNOS | =17.1-r2-s4 | |
Juniper JUNOS | =17.1-r2-s5 | |
Juniper JUNOS | =17.1-r2-s6 | |
Juniper JUNOS | =17.1-r2-s7 | |
Juniper JUNOS | =17.1-r2-s8 | |
Juniper JUNOS | =17.2 | |
Juniper JUNOS | =17.2-r1-s2 | |
Juniper JUNOS | =17.2-r1-s4 | |
Juniper JUNOS | =17.2-r2 | |
Juniper JUNOS | =17.3 | |
Juniper JUNOS | =17.3-r2 | |
Juniper JUNOS | =17.3-r2-s1 | |
Juniper JUNOS | =17.3-r2-s2 | |
Juniper JUNOS | =17.3-r2-s3 |
The following software releases have been updated to resolve this specific issue: 15.1F6-S12, 15.1R7-S2, 15.1X49-D150, 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590, 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.2R2-S7, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.3R2-S4, 17.3R3, 17.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0066 has a high severity rating due to its potential to cause a Denial of Service (DoS) condition.
To fix CVE-2019-0066, upgrade to a non-vulnerable version of Junos OS as specified by Juniper Networks.
CVE-2019-0066 affects specific versions of Juniper Networks Junos OS, including version 15.1 and several of its sub-releases.
Yes, CVE-2019-0066 can be exploited remotely, allowing attackers to send malformed IPv4 packets to trigger the vulnerability.
The impact of CVE-2019-0066 on affected devices is a crash of the routing protocol daemon (rpd), leading to service interruption.