CVE-2020-1644
17.07.2020, 19:15
On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt of a specific BGP UPDATE packet causes an internal counter to be incremented incorrectly, which over time can lead to the routing protocols process (RPD) crash and restart. This issue affects both IBGP and EBGP multihop deployment in IPv4 or IPv6 network. This issue affects: Juniper Networks Junos OS: 17.2X75 versions prior to 17.2X75-D105.19; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S10, 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.2X75 versions prior to 18.2X75-D13, 18.2X75-D411.1, 18.2X75-D420.18, 18.2X75-D52.3, 18.2X75-D60; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R2-S2, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2. Juniper Networks Junos OS Evolved: any releases prior to 20.1R2-EVO. This issue does not affect Juniper Networks Junos OS releases prior to 17.3R1.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 17.2x75:x75 |
juniper | junos | 17.2x75:x75 |
juniper | junos | 17.2x75:x75 |
juniper | junos | 17.2x75:x75 |
juniper | junos | 17.2x75:x75 |
juniper | junos | 17.3 |
juniper | junos | 17.3:r1-s1 |
juniper | junos | 17.3:r2 |
juniper | junos | 17.3:r2-s1 |
juniper | junos | 17.3:r2-s2 |
juniper | junos | 17.3:r2-s3 |
juniper | junos | 17.3:r2-s4 |
juniper | junos | 17.3:r3 |
juniper | junos | 17.3:r3-s1 |
juniper | junos | 17.3:r3-s2 |
juniper | junos | 17.3:r3-s3 |
juniper | junos | 17.3:r3-s4 |
juniper | junos | 17.3:r3-s7 |
juniper | junos | 17.4 |
juniper | junos | 17.4:r1 |
juniper | junos | 17.4:r1-s1 |
juniper | junos | 17.4:r1-s2 |
juniper | junos | 17.4:r1-s4 |
juniper | junos | 17.4:r1-s5 |
juniper | junos | 17.4:r1-s6 |
juniper | junos | 17.4:r1-s7 |
juniper | junos | 17.4:r2 |
juniper | junos | 17.4:r2-s1 |
juniper | junos | 17.4:r2-s2 |
juniper | junos | 17.4:r2-s3 |
juniper | junos | 17.4:r2-s4 |
juniper | junos | 17.4:r2-s5 |
juniper | junos | 17.4:r2-s6 |
juniper | junos | 17.4:r2-s7 |
juniper | junos | 17.4:r2-s8 |
juniper | junos | 17.4:r2-s9 |
juniper | junos | 17.4:r3 |
juniper | junos | 17.4:r3-s1 |
juniper | junos | 18.1 |
juniper | junos | 18.1:r1 |
juniper | junos | 18.1:r2 |
juniper | junos | 18.1:r2-s1 |
juniper | junos | 18.1:r2-s2 |
juniper | junos | 18.1:r2-s4 |
juniper | junos | 18.1:r3 |
juniper | junos | 18.1:r3-s1 |
juniper | junos | 18.1:r3-s2 |
juniper | junos | 18.1:r3-s3 |
juniper | junos | 18.1:r3-s4 |
juniper | junos | 18.1:r3-s6 |
juniper | junos | 18.1:r3-s7 |
juniper | junos | 18.1:r3-s8 |
juniper | junos | 18.1:r3-s9 |
juniper | junos | 18.2 |
juniper | junos | 18.2:r1 |
juniper | junos | 18.2:r1 |
juniper | junos | 18.2:r1-s3 |
juniper | junos | 18.2:r1-s4 |
juniper | junos | 18.2:r1-s5 |
juniper | junos | 18.2:r2 |
juniper | junos | 18.2:r2-s1 |
juniper | junos | 18.2:r2-s2 |
juniper | junos | 18.2:r2-s3 |
juniper | junos | 18.2:r2-s4 |
juniper | junos | 18.2:r2-s5 |
juniper | junos | 18.2:r2-s6 |
juniper | junos | 18.2:r3 |
juniper | junos | 18.2:r3-s1 |
juniper | junos | 18.2:r3-s2 |
juniper | junos | 18.2:r3-s3 |
juniper | junos | 18.2x75:x75 |
juniper | junos | 18.2x75:x75 |
juniper | junos | 18.2x75:x75 |
juniper | junos | 18.2x75:x75 |
juniper | junos | 18.3 |
juniper | junos | 18.3:r1 |
juniper | junos | 18.3:r1-s1 |
juniper | junos | 18.3:r1-s2 |
juniper | junos | 18.3:r1-s3 |
juniper | junos | 18.3:r1-s5 |
juniper | junos | 18.3:r1-s6 |
juniper | junos | 18.3:r2 |
juniper | junos | 18.3:r2-s1 |
juniper | junos | 18.3:r2-s2 |
juniper | junos | 18.3:r2-s3 |
juniper | junos | 18.3:r3 |
juniper | junos | 18.3:r3-s1 |
juniper | junos | 18.4 |
juniper | junos | 18.4:r1 |
juniper | junos | 18.4:r1-s1 |
juniper | junos | 18.4:r1-s2 |
juniper | junos | 18.4:r1-s5 |
juniper | junos | 18.4:r1-s6 |
juniper | junos | 18.4:r2 |
juniper | junos | 18.4:r2-s1 |
juniper | junos | 18.4:r2-s2 |
juniper | junos | 18.4:r2-s3 |
juniper | junos | 18.4:r3 |
juniper | junos | 18.4:r3-s1 |
juniper | junos | 19.1 |
juniper | junos | 19.1:r1 |
juniper | junos | 19.1:r1-s1 |
juniper | junos | 19.1:r1-s2 |
juniper | junos | 19.1:r1-s3 |
juniper | junos | 19.1:r1-s4 |
juniper | junos | 19.1:r2 |
juniper | junos | 19.2 |
juniper | junos | 19.2:r1 |
juniper | junos | 19.2:r1-s1 |
juniper | junos | 19.2:r1-s2 |
juniper | junos | 19.2:r1-s3 |
juniper | junos | 19.2:r1-s4 |
juniper | junos | 19.3 |
juniper | junos | 19.3:r1 |
juniper | junos | 19.3:r1-s1 |
juniper | junos | 19.3:r2 |
juniper | junos | 19.3:r2-s1 |
juniper | junos | 19.4:r1 |
juniper | junos | 19.4:r1-s1 |
juniper | junos_os_evolved | 18.3:r1 |
juniper | junos_os_evolved | 19.1:r1 |
juniper | junos_os_evolved | 19.1:r2 |
juniper | junos_os_evolved | 19.2:r1 |
juniper | junos_os_evolved | 19.2:r2 |
juniper | junos_os_evolved | 19.3:r1 |
juniper | junos_os_evolved | 19.3:r2 |
juniper | junos_os_evolved | 20.1:r1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-703 - Improper Check or Handling of Exceptional ConditionsThe software does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the software.
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.