First published: Wed Apr 08 2020(Updated: )
On High-End SRX Series devices, in specific configurations and when specific networking events or operator actions occur, an SPC receiving genuine multicast traffic may core. Subsequently, all FPCs in a chassis may reset causing a Denial of Service. This issue affects both IPv4 and IPv6. This issue affects: Juniper Networks Junos OS 12.3X48 version 12.3X48-D80 and later versions prior to 12.3X48-D95 on High-End SRX Series. This issue does not affect Branch SRX Series devices.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper JUNOS | =12.3x48 | |
Juniper JUNOS | =12.3x48-d10 | |
Juniper JUNOS | =12.3x48-d15 | |
Juniper JUNOS | =12.3x48-d20 | |
Juniper JUNOS | =12.3x48-d25 | |
Juniper JUNOS | =12.3x48-d30 | |
Juniper JUNOS | =12.3x48-d35 | |
Juniper JUNOS | =12.3x48-d40 | |
Juniper JUNOS | =12.3x48-d45 | |
Juniper JUNOS | =12.3x48-d50 | |
Juniper JUNOS | =12.3x48-d51 | |
Juniper JUNOS | =12.3x48-d55 | |
Juniper JUNOS | =12.3x48-d60 | |
Juniper JUNOS | =12.3x48-d65 | |
Juniper JUNOS | =12.3x48-d70 | |
Juniper JUNOS | =12.3x48-d75 | |
Juniper JUNOS | =12.3x48-d80 | |
Juniper Srx1500 | ||
Juniper Srx300 | ||
Juniper Srx4100 | ||
Juniper Srx4200 | ||
Juniper Srx4600 | ||
Juniper Srx5400 | ||
Juniper Srx550 | ||
Juniper Srx5600 | ||
Juniper Srx5800 |
The following software releases have been updated to resolve this specific issue: 12.3X48-D95, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-1634.
The severity of CVE-2020-1634 is high with a severity value of 7.5.
The Juniper Junos software versions 12.3x48 and its derivatives are affected by CVE-2020-1634.
CVE-2020-1634 can cause a Denial of Service (DoS) by triggering a reset of all FPCs in a chassis on High-End SRX Series devices.
To fix CVE-2020-1634, users are advised to upgrade to a patched version of Juniper Junos software.