Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-1664

A stack buffer overflow vulnerability in the device control daemon (DCD) on Juniper Networks Junos OS allows a low privilege local user to create a Denial of Service (DoS) against the daemon or execute arbitrary code in the system with root privilege. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S4; 18.4 versions prior to 18.4R2-S5, 18.4R3-S5; 19.1 versions prior to 19.1R3-S3; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S4, 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2. Versions of Junos OS prior to 17.3 are unaffected by this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 14.3%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 7.2
Products affected by CVE-2020-1664
  • Juniper » Junos » Version: 17.3
    cpe:2.3:o:juniper:junos:17.3
  • Juniper » Junos » Version: 17.4
    cpe:2.3:o:juniper:junos:17.4
  • Juniper » Junos » Version: 18.1
    cpe:2.3:o:juniper:junos:18.1
  • Juniper » Junos » Version: 18.2
    cpe:2.3:o:juniper:junos:18.2
  • Juniper » Junos » Version: 18.2x75
    cpe:2.3:o:juniper:junos:18.2x75
  • Juniper » Junos » Version: 18.3
    cpe:2.3:o:juniper:junos:18.3
  • Juniper » Junos » Version: 18.4
    cpe:2.3:o:juniper:junos:18.4
  • Juniper » Junos » Version: 19.1
    cpe:2.3:o:juniper:junos:19.1
  • Juniper » Junos » Version: 19.2
    cpe:2.3:o:juniper:junos:19.2
  • Juniper » Junos » Version: 19.3
    cpe:2.3:o:juniper:junos:19.3
  • Juniper » Junos » Version: 19.4
    cpe:2.3:o:juniper:junos:19.4
  • Juniper » Junos » Version: 20.1
    cpe:2.3:o:juniper:junos:20.1
  • Juniper » Junos » Version: 20.2
    cpe:2.3:o:juniper:junos:20.2


Contact Us

Shodan ® - All rights reserved