Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-1671

On Juniper Networks Junos OS platforms configured as DHCPv6 local server or DHCPv6 Relay Agent, Juniper Networks Dynamic Host Configuration Protocol Daemon (JDHCPD) process might crash with a core dump if a malformed DHCPv6 packet is received, resulting with the restart of the daemon. This issue only affects DHCPv6, it does not affect DHCPv4. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.2X75 versions prior to 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.2 version 19.2R2 and later versions; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2; This issue does not affect Juniper Networks Junos OS prior to 17.4R1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 59.2%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2020-1671
  • Juniper » Junos » Version: 17.4
    cpe:2.3:o:juniper:junos:17.4
  • Juniper » Junos » Version: 18.1
    cpe:2.3:o:juniper:junos:18.1
  • Juniper » Junos » Version: 18.2
    cpe:2.3:o:juniper:junos:18.2
  • Juniper » Junos » Version: 18.2x75
    cpe:2.3:o:juniper:junos:18.2x75
  • Juniper » Junos » Version: 18.3
    cpe:2.3:o:juniper:junos:18.3
  • Juniper » Junos » Version: 18.4
    cpe:2.3:o:juniper:junos:18.4
  • Juniper » Junos » Version: 19.1
    cpe:2.3:o:juniper:junos:19.1
  • Juniper » Junos » Version: 19.2
    cpe:2.3:o:juniper:junos:19.2
  • Juniper » Junos » Version: 19.3
    cpe:2.3:o:juniper:junos:19.3
  • Juniper » Junos » Version: 19.4
    cpe:2.3:o:juniper:junos:19.4
  • Juniper » Junos » Version: 20.1
    cpe:2.3:o:juniper:junos:20.1


Contact Us

Shodan ® - All rights reserved