Vulnerability identifier: #VU82465
Vulnerability risk: Medium
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-665
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Juniper Junos OS
Operating systems & Components /
Operating system
Vendor: Juniper Networks, Inc.
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on EX4650 devices, packets received on the management interface (em0) but not destined to the device, may be improperly forwarded to an egress interface, instead of being discarded.
Such traffic being sent by a client may appear genuine, but is non-standard in nature and should be considered as potentially malicious.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Juniper Junos OS: 21.4R1 - 21.4R1-S2, 21.1 - 21.1R3, 20.2 - 20.2R3-S3, 19.2 - 19.2R3-S4, 19.2R1-S4, 20.4 - 20.4R3-S1, 20.3 - 20.3R3-S2, 19.1 - 19.1R3-S7, 19.1R1-S4, 21.2R1 - 21.2R2-S2, 20.1 - 20.1R3-S2, 19.4 - 19.4R3-S6, 19.4R1 - 19.4R1-S4, 19.3 - 19.3R3-S4, 19.3R1-S1, 19.3R2 - 19.3R2-S7, 21.3R1 - 21.3R1-S2
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.