Vulnerability Database

290,301

Total vulnerabilities in the database

CVE-2018-0032

The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specific versions of Junos OS listed within this advisory. Earlier releases are unaffected by this vulnerability. This crafted BGP UPDATE does not propagate to other BGP peers. Affected releases are Juniper Networks Junos OS: 16.1X65 versions prior to 16.1X65-D47; 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D110; 17.3 versions prior to 17.3R1-S4, 17.3R2; 17.4 versions prior to 17.4R1-S3, 17.4R2.

  • Published: Jul 11, 2018
  • Updated: Apr 13, 2023
  • CVE: CVE-2018-0032
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.5
  • AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v2:

  • Severity: Medium
  • Score: 5
  • AV:N/AC:L/Au:N/C:N/I:N/A:P

CWEs:

Software From Fixed in
juniper / junos 16.1x65 16.1x65.x
juniper / junos 16.1x65-d30 16.1x65-d30.x
juniper / junos 16.1x65-d35 16.1x65-d35.x
juniper / junos 16.1x65-d40 16.1x65-d40.x
juniper / junos 17.2x75 17.2x75.x
juniper / junos 17.3-r1 17.3-r1.x
juniper / junos 17.3 17.3.x
juniper / junos 17.4 17.4.x
juniper / junos 17.4-r1 17.4-r1.x