Vulnerability Database

296,213

Total vulnerabilities in the database

CVE-2020-1679

On Juniper Networks PTX and QFX Series devices with packet sampling configured using tunnel-observation mpls-over-udp, sampling of a malformed packet can cause the Kernel Routing Table (KRT) queue to become stuck. KRT is the module within the Routing Process Daemon (RPD) that synchronized the routing tables with the forwarding tables in the kernel. This table is then synchronized to the Packet Forwarding Engine (PFE) via the KRT queue. Thus, when KRT queue become stuck, it can lead to unexpected packet forwarding issues. An administrator can monitor the following command to check if there is the KRT queue is stuck: user@device > show krt state ... Number of async queue entries: 65007 <--- this value keep on increasing. When this issue occurs, the following message might appear in the /var/log/messages: DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Too many delayed route/nexthop unrefs. Op 2 err 55, rtsm_id 5:-1, msg type 2 DATE DEVICE kernel: %KERN-3: rt_pfe_veto: Memory usage of M_RTNEXTHOP type = (0) Max size possible for M_RTNEXTHOP type = (7297134592) Current delayed unref = (60000), Current unique delayed unref = (18420), Max delayed unref on this platform = (40000) Current delayed weight unref = (60000) Max delayed weight unref on this platform= (400000) curproc = rpd This issue affects Juniper Networks Junos OS on PTX/QFX Series: 17.2X75 versions prior to 17.2X75-D105; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.2X75 versions prior to 18.2X75-D420, 18.2X75-D53, 18.2X75-D65; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS prior to 18.1R1.

  • Published: Oct 16, 2020
  • Updated: May 4, 2025
  • CVE: CVE-2020-1679
  • Severity: Low
  • Exploit:

CVSS v2:

  • Severity: Low
  • Score: 4.3
  • AV:N/AC:M/Au:N/C:N/I:N/A:P

No CWE or OWASP classifications available.

Software From Fixed in
juniper / junos 17.2x75 17.2x75.x
juniper / junos 17.2x75-d50 17.2x75-d50.x
juniper / junos 17.2x75-d70 17.2x75-d70.x
juniper / junos 17.2x75-d102 17.2x75-d102.x
juniper / junos 17.2x75-d92 17.2x75-d92.x
juniper / junos 18.1-r3-s1 18.1-r3-s1.x
juniper / junos 18.1-r2-s2 18.1-r2-s2.x
juniper / junos 18.1-r3-s4 18.1-r3-s4.x
juniper / junos 18.1-r3-s3 18.1-r3-s3.x
juniper / junos 18.1-r3-s2 18.1-r3-s2.x
juniper / junos 18.1 18.1.x
juniper / junos 18.1-r2-s1 18.1-r2-s1.x
juniper / junos 18.1-r2-s4 18.1-r2-s4.x
juniper / junos 18.1-r1 18.1-r1.x
juniper / junos 18.1-r3 18.1-r3.x
juniper / junos 18.1-r2 18.1-r2.x
juniper / junos 18.1-r3-s6 18.1-r3-s6.x
juniper / junos 18.1-r3-s7 18.1-r3-s7.x
juniper / junos 18.1-r3-s8 18.1-r3-s8.x
juniper / junos 18.1-r3-s9 18.1-r3-s9.x
juniper / junos 18.1-r3-s10 18.1-r3-s10.x
juniper / junos 18.2-r3-s3 18.2-r3-s3.x
juniper / junos 18.2-r3-s4 18.2-r3-s4.x
juniper / junos 18.2-r3-s2 18.2-r3-s2.x
juniper / junos 18.2-r2-s5 18.2-r2-s5.x
juniper / junos 18.2-r2-s6 18.2-r2-s6.x
juniper / junos 18.2-r3-s1 18.2-r3-s1.x
juniper / junos 18.2-r3 18.2-r3.x
juniper / junos 18.2-r1 18.2-r1.x
juniper / junos 18.2 18.2.x
juniper / junos 18.2-r2-s1 18.2-r2-s1.x
juniper / junos 18.2-r2-s2 18.2-r2-s2.x
juniper / junos 18.2-r1-s3 18.2-r1-s3.x
juniper / junos 18.2-r2-s3 18.2-r2-s3.x
juniper / junos 18.2-r2-s4 18.2-r2-s4.x
juniper / junos 18.2-r1-s4 18.2-r1-s4.x
juniper / junos 18.2-r1-s5 18.2-r1-s5.x
juniper / junos 18.2-r2 18.2-r2.x
juniper / junos 18.2x75 18.2x75.x
juniper / junos 18.2x75-d20 18.2x75-d20.x
juniper / junos 18.2x75-d40 18.2x75-d40.x
juniper / junos 18.2x75-d30 18.2x75-d30.x
juniper / junos 18.2x75-d12 18.2x75-d12.x
juniper / junos 18.2x75-d51 18.2x75-d51.x
juniper / junos 18.2x75-d411 18.2x75-d411.x
juniper / junos 18.3-r3-s1 18.3-r3-s1.x
juniper / junos 18.3-r2-s3 18.3-r2-s3.x
juniper / junos 18.3-r3-s2 18.3-r3-s2.x
juniper / junos 18.3-r1-s6 18.3-r1-s6.x
juniper / junos 18.3-r3 18.3-r3.x
juniper / junos 18.3-r1-s5 18.3-r1-s5.x
juniper / junos 18.3-r2-s1 18.3-r2-s1.x
juniper / junos 18.3-r2-s2 18.3-r2-s2.x
juniper / junos 18.3-r1-s2 18.3-r1-s2.x
juniper / junos 18.3 18.3.x
juniper / junos 18.3-r1-s3 18.3-r1-s3.x
juniper / junos 18.3-r1-s1 18.3-r1-s1.x
juniper / junos 18.3-r2 18.3-r2.x
juniper / junos 18.3-r1 18.3-r1.x
juniper / junos 18.4-r1 18.4-r1.x
juniper / junos 18.4-r2 18.4-r2.x
juniper / junos 18.4-r1-s1 18.4-r1-s1.x
juniper / junos 18.4 18.4.x
juniper / junos 18.4-r1-s2 18.4-r1-s2.x
juniper / junos 18.4-r2-s1 18.4-r2-s1.x
juniper / junos 18.4-r1-s5 18.4-r1-s5.x
juniper / junos 18.4-r2-s2 18.4-r2-s2.x
juniper / junos 18.4-r3 18.4-r3.x
juniper / junos 18.4-r2-s3 18.4-r2-s3.x
juniper / junos 18.4-r1-s6 18.4-r1-s6.x
juniper / junos 18.4-r3-s3 18.4-r3-s3.x
juniper / junos 18.4-r3-s2 18.4-r3-s2.x
juniper / junos 18.4-r3-s1 18.4-r3-s1.x
juniper / junos 18.4-r2-s4 18.4-r2-s4.x
juniper / junos 19.1-r2-s1 19.1-r2-s1.x
juniper / junos 19.1-r3 19.1-r3.x
juniper / junos 19.1-r3-s1 19.1-r3-s1.x
juniper / junos 19.1-r1-s4 19.1-r1-s4.x
juniper / junos 19.1-r2 19.1-r2.x
juniper / junos 19.1-r1-s1 19.1-r1-s1.x
juniper / junos 19.1-r1-s3 19.1-r1-s3.x
juniper / junos 19.1-r1-s2 19.1-r1-s2.x
juniper / junos 19.1-r1 19.1-r1.x
juniper / junos 19.1 19.1.x
juniper / junos 19.2-r1 19.2-r1.x
juniper / junos 19.2-r1-s1 19.2-r1-s1.x
juniper / junos 19.2-r1-s2 19.2-r1-s2.x
juniper / junos 19.2 19.2.x
juniper / junos 19.2-r1-s4 19.2-r1-s4.x
juniper / junos 19.2-r1-s3 19.2-r1-s3.x
juniper / junos 19.3-r2-s1 19.3-r2-s1.x
juniper / junos 19.3-r1-s1 19.3-r1-s1.x
juniper / junos 19.3-r2 19.3-r2.x
juniper / junos 19.3 19.3.x
juniper / junos 19.3-r1 19.3-r1.x
juniper / junos 19.3-r2-s2 19.3-r2-s2.x
juniper / junos 19.4-r1-s1 19.4-r1-s1.x
juniper / junos 19.4-r2 19.4-r2.x
juniper / junos 19.4-r1 19.4-r1.x
juniper / junos 20.1-r1 20.1-r1.x
juniper / junos 20.1-r1-s1 20.1-r1-s1.x