First published: Fri Oct 16 2020(Updated: )
On SRX Series devices, a vulnerability in the key-management-daemon (kmd) daemon of Juniper Networks Junos OS allows an attacker to spoof packets targeted to IPSec peers before a security association (SA) is established thereby causing a failure to set up the IPSec channel. Sustained receipt of these spoofed packets can cause a sustained Denial of Service (DoS) condition. This issue affects IPv4 and IPv6 implementations. This issue affects Juniper Networks Junos OS on SRX Series: 12.3X48 versions prior to 12.3X48-D90; 15.1X49 versions prior to 15.1X49-D190; 17.4 versions prior to 17.4R2-S9, 17.4R3; 18.1 versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R1-S6, 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2. This issue does not affect 12.3 or 15.1 releases which are non-SRX Series releases.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | =12.3x48 | |
Juniper Junos | =12.3x48-d10 | |
Juniper Junos | =12.3x48-d15 | |
Juniper Junos | =12.3x48-d20 | |
Juniper Junos | =12.3x48-d25 | |
Juniper Junos | =12.3x48-d30 | |
Juniper Junos | =12.3x48-d35 | |
Juniper Junos | =12.3x48-d40 | |
Juniper Junos | =12.3x48-d45 | |
Juniper Junos | =12.3x48-d50 | |
Juniper Junos | =12.3x48-d51 | |
Juniper Junos | =12.3x48-d55 | |
Juniper Junos | =12.3x48-d60 | |
Juniper Junos | =12.3x48-d65 | |
Juniper Junos | =12.3x48-d70 | |
Juniper Junos | =12.3x48-d75 | |
Juniper Junos | =12.3x48-d80 | |
Juniper Junos | =15.1x49 | |
Juniper Junos | =15.1x49-d10 | |
Juniper Junos | =15.1x49-d100 | |
Juniper Junos | =15.1x49-d110 | |
Juniper Junos | =15.1x49-d120 | |
Juniper Junos | =15.1x49-d130 | |
Juniper Junos | =15.1x49-d140 | |
Juniper Junos | =15.1x49-d15 | |
Juniper Junos | =15.1x49-d150 | |
Juniper Junos | =15.1x49-d160 | |
Juniper Junos | =15.1x49-d170 | |
Juniper Junos | =15.1x49-d180 | |
Juniper Junos | =17.4 | |
Juniper Junos | =17.4-r1 | |
Juniper Junos | =17.4-r1-s1 | |
Juniper Junos | =17.4-r1-s2 | |
Juniper Junos | =17.4-r1-s4 | |
Juniper Junos | =17.4-r1-s5 | |
Juniper Junos | =17.4-r1-s6 | |
Juniper Junos | =17.4-r1-s7 | |
Juniper Junos | =17.4-r2 | |
Juniper Junos | =17.4-r2-s1 | |
Juniper Junos | =17.4-r2-s10 | |
Juniper Junos | =17.4-r2-s2 | |
Juniper Junos | =17.4-r2-s3 | |
Juniper Junos | =17.4-r2-s4 | |
Juniper Junos | =17.4-r2-s5 | |
Juniper Junos | =17.4-r2-s6 | |
Juniper Junos | =17.4-r2-s7 | |
Juniper Junos | =17.4-r2-s8 | |
Juniper Junos | =18.1 | |
Juniper Junos | =18.1-r1 | |
Juniper Junos | =18.1-r2 | |
Juniper Junos | =18.1-r2-s1 | |
Juniper Junos | =18.1-r2-s2 | |
Juniper Junos | =18.1-r2-s4 | |
Juniper Junos | =18.1-r3 | |
Juniper Junos | =18.1-r3-s1 | |
Juniper Junos | =18.1-r3-s2 | |
Juniper Junos | =18.1-r3-s3 | |
Juniper Junos | =18.1-r3-s4 | |
Juniper Junos | =18.1-r3-s6 | |
Juniper Junos | =18.1-r3-s7 | |
Juniper Junos | =18.1-r3-s8 | |
Juniper Junos | =18.2 | |
Juniper Junos | =18.2-r1 | |
Juniper Junos | =18.2-r1 | |
Juniper Junos | =18.2-r1-s3 | |
Juniper Junos | =18.2-r1-s4 | |
Juniper Junos | =18.2-r1-s5 | |
Juniper Junos | =18.2-r2 | |
Juniper Junos | =18.2-r2-s1 | |
Juniper Junos | =18.2-r2-s2 | |
Juniper Junos | =18.2-r2-s3 | |
Juniper Junos | =18.2-r2-s4 | |
Juniper Junos | =18.2-r2-s5 | |
Juniper Junos | =18.2-r2-s6 | |
Juniper Junos | =18.3 | |
Juniper Junos | =18.3-r1 | |
Juniper Junos | =18.3-r1-s1 | |
Juniper Junos | =18.3-r1-s2 | |
Juniper Junos | =18.3-r1-s3 | |
Juniper Junos | =18.3-r1-s5 | |
Juniper Junos | =18.3-r1-s6 | |
Juniper Junos | =18.3-r2 | |
Juniper Junos | =18.3-r2-s1 | |
Juniper Junos | =18.3-r2-s2 | |
Juniper Junos | =18.4 | |
Juniper Junos | =18.4-r1 | |
Juniper Junos | =18.4-r1-s1 | |
Juniper Junos | =18.4-r1-s2 | |
Juniper Junos | =18.4-r1-s5 | |
Juniper Junos | =18.4-r2 | |
Juniper Junos | =18.4-r2-s1 | |
Juniper Junos | =18.4-r2-s2 | |
Juniper Junos | =19.1 | |
Juniper Junos | =19.1-r1 | |
Juniper Junos | =19.1-r1-s1 | |
Juniper Junos | =19.1-r1-s2 | |
Juniper Junos | =19.1-r1-s3 |
The following software releases have been updated to resolve this specific issue: 12.3X48-D90, 15.1X49-D190, 17.4R2-S9, 17.4R3, 18.1R3-S9, 18.2R3, 18.3R1-S7, 18.3R2-S3, 18.3R3, 18.4R1-S6, 18.4R2-S3, 18.4R3, 19.1R1-S4, 19.1R2, 19.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1657 has been rated as a high severity vulnerability due to its potential to allow packet spoofing.
To fix CVE-2020-1657, upgrade to the patched versions of Junos OS as specified by Juniper Networks.
CVE-2020-1657 affects various models within the SRX Series that run specific versions of Junos OS.
CVE-2020-1657 can lead to failures in establishing IPSec channels due to packet spoofing before the security association is formed.
You can determine if your system is vulnerable to CVE-2020-1657 by checking if it is running an affected version of Junos OS.