CVE-2019-0065

On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on MX Series: 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R3-S6 ; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S3; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
juniperCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 50%
VendorProductVersion
juniperjunos
16.1
juniperjunos
16.1:r1
juniperjunos
16.1:r2
juniperjunos
16.1:r3
juniperjunos
16.1:r3-s10
juniperjunos
16.1:r3-s11
juniperjunos
16.1:r4
juniperjunos
16.1:r5
juniperjunos
16.1:r5-s4
juniperjunos
16.1:r6
juniperjunos
16.1:r6-s1
juniperjunos
16.1:r6-s6
juniperjunos
16.1:r7
juniperjunos
16.1:r7-s3
juniperjunos
16.1:r7-s4
juniperjunos
16.2
juniperjunos
16.2:r1
juniperjunos
16.2:r2
juniperjunos
16.2:r2-s1
juniperjunos
16.2:r2-s10
juniperjunos
16.2:r2-s2
juniperjunos
16.2:r2-s5
juniperjunos
16.2:r2-s6
juniperjunos
16.2:r2-s7
juniperjunos
16.2:r2-s8
juniperjunos
16.2:r2-s9
juniperjunos
17.1
juniperjunos
17.1:r1
juniperjunos
17.1:r2-s1
juniperjunos
17.1:r2-s10
juniperjunos
17.1:r2-s2
juniperjunos
17.1:r2-s3
juniperjunos
17.1:r2-s4
juniperjunos
17.1:r2-s5
juniperjunos
17.1:r2-s6
juniperjunos
17.1:r2-s7
juniperjunos
17.2
juniperjunos
17.2:r1-s2
juniperjunos
17.2:r1-s4
juniperjunos
17.2:r1-s7
juniperjunos
17.2:r1-s8
juniperjunos
17.2:r2-s6
juniperjunos
17.2:r2-s7
juniperjunos
17.2:r3-s1
juniperjunos
17.2:r3-s2
juniperjunos
17.3
juniperjunos
17.3:r2
juniperjunos
17.3:r2-s1
juniperjunos
17.3:r2-s2
juniperjunos
17.3:r3-s1
juniperjunos
17.3:r3-s2
juniperjunos
17.3:r3-s3
juniperjunos
17.3:r3-s4
juniperjunos
17.3:r3-s5
juniperjunos
17.4
juniperjunos
17.4:r1
juniperjunos
17.4:r1-s1
juniperjunos
17.4:r1-s2
juniperjunos
17.4:r1-s4
juniperjunos
17.4:r1-s6
juniperjunos
17.4:r1-s7
juniperjunos
17.4:r2
juniperjunos
17.4:r2-s1
juniperjunos
17.4:r2-s3
juniperjunos
17.4:r2-s4
juniperjunos
17.4:r2-s5
juniperjunos
17.4:r2-s6
juniperjunos
17.4:r2-s7
juniperjunos
18.1
juniperjunos
18.1:r2
juniperjunos
18.1:r2-s1
juniperjunos
18.1:r2-s2
juniperjunos
18.1:r2-s4
juniperjunos
18.1:r3
juniperjunos
18.1:r3-s2
juniperjunos
18.2
juniperjunos
18.2:r1-s5
juniperjunos
18.2:r2-s1
juniperjunos
18.2:r2-s2
juniperjunos
18.2:r2-s3
juniperjunos
18.2:r2-s4
juniperjunos
18.3
juniperjunos
18.3:r1
juniperjunos
18.3:r1-s1
juniperjunos
18.3:r1-s2
juniperjunos
18.3:r1-s3
juniperjunos
18.4
juniperjunos
18.4:r1
juniperjunos
18.4:r1-s2
𝑥
= Vulnerable software versions