CVE-2020-1671
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/10/2020
Last modified:
05/02/2021
Description
On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, resulting with the restart of the daemon. This issue only affects DHCPv6, it does not affect DHCPv4. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.2 version 19.2R2 and later versions; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2; This issue does not affect Juniper Networks Junos OS prior to 17.4R1.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



