CVE-2017-10618

When the 'bgp-error-tolerance' feature â€" designed to help mitigate remote session resets from malformed path attributes â€" is enabled, a BGP UPDATE containing a specifically crafted set of transitive attributes can cause the RPD routing process to crash and restart. Devices with BGP enabled that do not have 'bgp-error-tolerance' configured are not vulnerable to this issue. Affected releases are Juniper Networks Junos OS 13.3 prior to 13.3R10-S2; 14.1 prior to 14.1R8-S4, 14.1R9; 14.1X50 prior to 14.1X50-D185; 14.1X53 prior to 14.1X53-D45, 14.1X53-D50; 14.2 prior to 14.2R7-S7, 14.2R8; 15.1 prior to 15.1F5-S8, 15.1F6-S7, 15.1R5-S6, 15.1R6-S2, 15.1R7; 15.1X49 prior to 15.1X49-D100; 15.1X53 prior to 15.1X53-D64, 15.1X53-D70; 16.1 prior to 16.1R3-S4, 16.1R4-S3, 16.1R5; 16.2 prior to 16.2R1-S5, 16.2R2; 17.1 prior to 17.1R1-S3, 17.1R2; 17.2 prior to 17.2R1-S2, 17.2R2; 17.2X75 prior to 17.2X75-D50. No other Juniper Networks products or platforms are affected by this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 52%
VendorProductVersion
juniperjunos
13.3
juniperjunos
13.3:r10
juniperjunos
13.3:r2
juniperjunos
13.3:r3
juniperjunos
13.3:r4
juniperjunos
13.3:r5
juniperjunos
13.3:r6
juniperjunos
13.3:r7
juniperjunos
13.3:r8
juniperjunos
13.3:r9
juniperjunos
14.1
juniperjunos
14.1:r1
juniperjunos
14.1:r2
juniperjunos
14.1:r3
juniperjunos
14.1:r4
juniperjunos
14.1:r5
juniperjunos
14.1:r6
juniperjunos
14.1:r7
juniperjunos
14.1:r8
juniperjunos
14.1:r9
juniperjunos
14.1x50:x50
juniperjunos
14.1x50:x50
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.1x53:x53
juniperjunos
14.2
juniperjunos
14.2:r1
juniperjunos
14.2:r2
juniperjunos
14.2:r3
juniperjunos
14.2:r4
juniperjunos
14.2:r5
juniperjunos
14.2:r6
juniperjunos
14.2:r7
juniperjunos
14.2:r8
juniperjunos
15.1
juniperjunos
15.1:f1
juniperjunos
15.1:f2
juniperjunos
15.1:f2-s1
juniperjunos
15.1:f2-s2
juniperjunos
15.1:f2-s3
juniperjunos
15.1:f2-s4
juniperjunos
15.1:f3
juniperjunos
15.1:f4
juniperjunos
15.1:f5
juniperjunos
15.1:f6-s7
juniperjunos
15.1:r1
juniperjunos
15.1:r2
juniperjunos
15.1:r3
juniperjunos
15.1:r4
juniperjunos
15.1:r5
juniperjunos
15.1:r5-s6
juniperjunos
15.1:r6-s2
juniperjunos
15.1:r7
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x49:x49
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
15.1x53:x53
juniperjunos
16.1
juniperjunos
16.1:r1
juniperjunos
16.1:r2
juniperjunos
16.1:r3
juniperjunos
16.1:r4-s3
juniperjunos
16.1:r5
juniperjunos
16.2
juniperjunos
16.2:r1
juniperjunos
16.2:r2
juniperjunos
17.1
juniperjunos
17.1:r1
juniperjunos
17.1:r2
juniperjunos
17.2
juniperjunos
17.2:r1
juniperjunos
17.2:r2
juniperjunos
17.2x75:x75
𝑥
= Vulnerable software versions