ID

VAR-202004-0945


CVE

CVE-2020-1629


TITLE

Juniper Networks Junos OS In Time-of-check Time-of-use (TOCTOU) Race condition vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2020-003956

DESCRIPTION

A race condition vulnerability on Juniper Network Junos OS devices may cause the routing protocol daemon (RPD) process to crash and restart while processing a BGP NOTIFICATION message. This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S6; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R2-S11, 17.1R3-S1; 17.2 versions prior to 17.2R1-S9, 17.2R3-S3; 17.2 version 17.2R2 and later versions; 17.2X75 versions prior to 17.2X75-D105, 17.2X75-D110; 17.3 versions prior to 17.3R2-S5, 17.3R3-S6; 17.4 versions prior to 17.4R2-S7, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3-S3; 18.2X75 versions prior to 18.2X75-D410, 18.2X75-D420, 18.2X75-D50, 18.2X75-D60; 18.3 versions prior to 18.3R1-S5, 18.3R2-S2, 18.3R3; 18.4 versions prior to 18.4R2-S2, 18.4R3; 19.1 versions prior to 19.1R1-S2, 19.1R2; 19.2 versions prior to 19.2R1-S4, 19.2R2. This issue does not affect Juniper Networks Junos OS prior to version 16.1R1. The operating system provides a secure programming interface and Junos SDK. The following products and versions are affected: Juniper Networks Junos OS Release 16.1, Release 16.2, Release 17.1, Release 17.2, Release 17.2X75, Release 17.3, Release 17.4, Release 18.1, Release 18.2, Release 18.2X75, Release 18.3, Release 18.4, Release 19.1 Version, 19.2

Trust: 1.71

sources: NVD: CVE-2020-1629 // JVNDB: JVNDB-2020-003956 // VULHUB: VHN-169353

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:17.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:16.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:16.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2x75

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.2x75

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:junipermodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-003956 // NVD: CVE-2020-1629

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-1629
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2020-1629
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-003956
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202004-525
value: MEDIUM

Trust: 0.6

VULHUB: VHN-169353
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-1629
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-003956
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-169353
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-1629
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: JVNDB-2020-003956
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-169353 // JVNDB: JVNDB-2020-003956 // CNNVD: CNNVD-202004-525 // NVD: CVE-2020-1629 // NVD: CVE-2020-1629

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.1

problemtype:CWE-366

Trust: 1.0

problemtype:CWE-367

Trust: 0.9

sources: VULHUB: VHN-169353 // JVNDB: JVNDB-2020-003956 // NVD: CVE-2020-1629

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202004-525

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-202004-525

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-003956

PATCH

title:JSA11009url:https://kb.juniper.net/JSA11009

Trust: 0.8

title:Juniper Networks Junos OS Repair measures for the competition condition problem loopholeurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=115727

Trust: 0.6

sources: JVNDB: JVNDB-2020-003956 // CNNVD: CNNVD-202004-525

EXTERNAL IDS

db:NVDid:CVE-2020-1629

Trust: 2.5

db:JUNIPERid:JSA11009

Trust: 1.7

db:JVNDBid:JVNDB-2020-003956

Trust: 0.8

db:CNNVDid:CNNVD-202004-525

Trust: 0.7

db:VULHUBid:VHN-169353

Trust: 0.1

sources: VULHUB: VHN-169353 // JVNDB: JVNDB-2020-003956 // CNNVD: CNNVD-202004-525 // NVD: CVE-2020-1629

REFERENCES

url:https://kb.juniper.net/jsa11009

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-1629

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1629

Trust: 0.8

url:https://vigilance.fr/vulnerability/junos-os-denial-of-service-via-bgp-notification-31973

Trust: 0.6

sources: VULHUB: VHN-169353 // JVNDB: JVNDB-2020-003956 // CNNVD: CNNVD-202004-525 // NVD: CVE-2020-1629

SOURCES

db:VULHUBid:VHN-169353
db:JVNDBid:JVNDB-2020-003956
db:CNNVDid:CNNVD-202004-525
db:NVDid:CVE-2020-1629

LAST UPDATE DATE

2024-08-14T15:38:30.981000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169353date:2022-04-25T00:00:00
db:JVNDBid:JVNDB-2020-003956date:2020-04-30T00:00:00
db:CNNVDid:CNNVD-202004-525date:2022-04-26T00:00:00
db:NVDid:CVE-2020-1629date:2022-04-25T17:38:04.103

SOURCES RELEASE DATE

db:VULHUBid:VHN-169353date:2020-04-08T00:00:00
db:JVNDBid:JVNDB-2020-003956date:2020-04-30T00:00:00
db:CNNVDid:CNNVD-202004-525date:2020-04-08T00:00:00
db:NVDid:CVE-2020-1629date:2020-04-08T20:15:14.167