ID

VAR-202010-0389


CVE

CVE-2020-1662


TITLE

Juniper Networks Junos OS  and  Junos OS Evolved  Vulnerabilities in devices

Trust: 0.8

sources: JVNDB: JVNDB-2020-012193

DESCRIPTION

On Juniper Networks Junos OS and Junos OS Evolved devices, BGP session flapping can lead to a routing process daemon (RPD) crash and restart, limiting the attack surface to configured BGP peers. This issue only affects devices with BGP damping in combination with accepted-prefix-limit configuration. When the issue occurs the following messages will appear in the /var/log/messages: rpd[6046]: %DAEMON-4-BGP_PREFIX_THRESH_EXCEEDED: XXXX (External AS x): Configured maximum accepted prefix-limit threshold(1800) exceeded for inet6-unicast nlri: 1984 (instance master) rpd[6046]: %DAEMON-3-BGP_CEASE_PREFIX_LIMIT_EXCEEDED: 2001:x:x:x::2 (External AS x): Shutting down peer due to exceeding configured maximum accepted prefix-limit(2000) for inet6-unicast nlri: 2001 (instance master) rpd[6046]: %DAEMON-4: bgp_rt_maxprefixes_check_common:9284: NOTIFICATION sent to 2001:x:x:x::2 (External AS x): code 6 (Cease) subcode 1 (Maximum Number of Prefixes Reached) AFI: 2 SAFI: 1 prefix limit 2000 kernel: %KERN-5: mastership_relinquish_on_process_exit: RPD crashed on master RE. Sending SIGUSR2 to chassisd (5612:chassisd) to trigger RE switchover This issue affects: Juniper Networks Junos OS: 17.2R3-S3; 17.3 version 17.3R3-S3 and later versions, prior to 17.3R3-S8; 17.4 version 17.4R2-S4, 17.4R3 and later versions, prior to 17.4R2-S10, 17.4R3-S2; 18.1 version 18.1R3-S6 and later versions, prior to 18.1R3-S10; 18.2 version 18.2R3 and later versions, prior to 18.2R3-S4; 18.2X75 version 18.2X75-D50, 18.2X75-D60 and later versions, prior to 18.2X75-D53, 18.2X75-D65; 18.3 version 18.3R2 and later versions, prior to 18.3R2-S4, 18.3R3-S2; 18.4 version 18.4R2 and later versions, prior to 18.4R2-S5, 18.4R3-S2; 19.1 version 19.1R1 and later versions, prior to 19.1R2-S2, 19.1R3-S1; 19.2 version 19.2R1 and later versions, prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2; 20.1 versions prior to 20.1R1-S2, 20.1R2. Juniper Networks Junos OS Evolved prior to 20.1R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 17.2R3-S3. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Junos OS that could be exploited by an attacker to trigger a fatal error slapping through a BGP session to trigger a denial of service

Trust: 1.8

sources: NVD: CVE-2020-1662 // JVNDB: JVNDB-2020-012193 // VULHUB: VHN-169716 // VULMON: CVE-2020-1662

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:19.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:20.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.2x75

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.3

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.1

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:19.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:17.4

Trust: 1.0

vendor:junipermodel:junosscope:eqversion:18.1

Trust: 1.0

vendor:ジュニパーネットワークスmodel:junos osscope:eqversion: -

Trust: 0.8

vendor:ジュニパーネットワークスmodel:junos osscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-012193 // NVD: CVE-2020-1662

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-1662
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2020-1662
value: HIGH

Trust: 1.0

NVD: CVE-2020-1662
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202010-666
value: HIGH

Trust: 0.6

VULHUB: VHN-169716
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-1662
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-1662
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-169716
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sirt@juniper.net: CVE-2020-1662
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2020-012193
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-169716 // VULMON: CVE-2020-1662 // JVNDB: JVNDB-2020-012193 // CNNVD: CNNVD-202010-666 // NVD: CVE-2020-1662 // NVD: CVE-2020-1662

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-012193 // NVD: CVE-2020-1662

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202010-666

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202010-666

PATCH

title:JSA11059url:https://kb.juniper.net/JSA11059

Trust: 0.8

title:Juniper Networks Junos OS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=130739

Trust: 0.6

sources: JVNDB: JVNDB-2020-012193 // CNNVD: CNNVD-202010-666

EXTERNAL IDS

db:NVDid:CVE-2020-1662

Trust: 2.6

db:JUNIPERid:JSA11059

Trust: 1.8

db:JVNDBid:JVNDB-2020-012193

Trust: 0.8

db:CNNVDid:CNNVD-202010-666

Trust: 0.7

db:VULHUBid:VHN-169716

Trust: 0.1

db:VULMONid:CVE-2020-1662

Trust: 0.1

sources: VULHUB: VHN-169716 // VULMON: CVE-2020-1662 // JVNDB: JVNDB-2020-012193 // CNNVD: CNNVD-202010-666 // NVD: CVE-2020-1662

REFERENCES

url:https://kb.juniper.net/jsa11059

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-1662

Trust: 1.4

url:https://vigilance.fr/vulnerability/junos-os-denial-of-service-via-bgp-session-flapping-33580

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/189901

Trust: 0.1

sources: VULHUB: VHN-169716 // VULMON: CVE-2020-1662 // JVNDB: JVNDB-2020-012193 // CNNVD: CNNVD-202010-666 // NVD: CVE-2020-1662

SOURCES

db:VULHUBid:VHN-169716
db:VULMONid:CVE-2020-1662
db:JVNDBid:JVNDB-2020-012193
db:CNNVDid:CNNVD-202010-666
db:NVDid:CVE-2020-1662

LAST UPDATE DATE

2024-11-23T22:40:56.519000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-169716date:2020-10-28T00:00:00
db:VULMONid:CVE-2020-1662date:2020-10-28T00:00:00
db:JVNDBid:JVNDB-2020-012193date:2021-04-27T05:33:00
db:CNNVDid:CNNVD-202010-666date:2020-10-29T00:00:00
db:NVDid:CVE-2020-1662date:2024-11-21T05:11:06.633

SOURCES RELEASE DATE

db:VULHUBid:VHN-169716date:2020-10-16T00:00:00
db:VULMONid:CVE-2020-1662date:2020-10-16T00:00:00
db:JVNDBid:JVNDB-2020-012193date:2021-04-27T00:00:00
db:CNNVDid:CNNVD-202010-666date:2020-10-15T00:00:00
db:NVDid:CVE-2020-1662date:2020-10-16T21:15:12.443