CVE-2018-0049 Detail
Current Description
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.
Source:
MITRE
Description Last Modified:
10/10/2018
View Analysis Description
Analysis Description
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to cause the Junos OS kernel to crash. Continued receipt of this specifically crafted malicious MPLS packet will cause a sustained Denial of Service condition. This issue require it to be received on an interface configured to receive this type of traffic. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D76 prior to 12.1X46-D81 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 12.3R12-S10; 12.3X48 versions above and including 12.3X48-D66 prior to 12.3X48-D75 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 14.1X53-D47 on EX2200/VC, EX3200, EX3300/VC, EX4200, EX4300, EX4550/VC, EX4600, EX6200, EX8200/VC (XRE), QFX3500, QFX3600, QFX5100; 14.1X53 versions above and including 14.1X53-D115 prior to 14.1X53-D130 on QFabric System; 15.1 versions above and including 15.1F6-S10; 15.1R4-S9; 15.1R6-S6; 15.1 versions above and including 15.1R7 prior to 15.1R7-S2; 15.1X49 versions above and including 15.1X49-D131 prior to 15.1X49-D150 on SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 15.1X53 versions above 15.1X53-D233 prior to 15.1X53-D235 on QFX5200/QFX5110; 15.1X53 versions up to and including 15.1X53-D471 prior to 15.1X53-D590 on NFX150, NFX250; 15.1X53-D67 on QFX10000 Series; 15.1X53-D59 on EX2300/EX3400; 16.1 versions above and including 16.1R3-S8; 16.1 versions above and including 16.1R4-S9 prior to 16.1R4-S12; 16.1 versions above and including 16.1R5-S4; 16.1 versions above and including 16.1R6-S3 prior to 16.1R6-S6; 16.1 versions above and including 16.1R7 prior to 16.1R7-S2; 16.2 versions above and including 16.2R1-S6; 16.2 versions above and including 16.2R2-S5 prior to 16.2R2-S7; 17.1R1-S7; 17.1 versions above and including 17.1R2-S7 prior to 17.1R2-S9; 17.2R1-S6; 17.2 versions above and including 17.2R2-S4 prior to 17.2R2-S6; 17.2X75 versions above and including 17.2X75-D100 prior to X17.2X75-D101, 17.2X75-D110; 17.3 versions above and including 17.3R1-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3 versions above and including 17.3R2-S2 prior to 17.3R2-S4 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.3R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4 versions above and including 17.4R1-S3 prior to 17.4R1-S5 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 17.4R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.1 versions above and including 18.1R2 prior to 18.1R2-S3, 18.1R3 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2 versions above and including 18.2R1 prior to 18.2R1-S2, 18.2R1-S3, 18.2R2 on All non-SRX Series and SRX100, SRX110, SRX210, SRX220, SRX240m, SRX550m SRX650, SRX300, SRX320, SRX340, SRX345, SRX1500, SRX4100, SRX4200, SRX4600 and vSRX; 18.2X75 versions above and including 18.2X75-D5 prior to 18.2X75-D20.
Source:
MITRE
Description Last Modified:
10/10/2018
Impact
CVSS v3.0 Severity and Metrics:
Base Score:
5.9 MEDIUM
Vector:
AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
(V3 legend)
Impact Score:
3.6
Exploitability Score:
2.2
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High
CVSS v2.0 Severity and Metrics:
Base Score:
7.1 HIGH
Vector:
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
(V2 legend)
Impact Subscore:
6.9
Exploitability Subscore:
8.6
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (AU):
None
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
Complete
Additional Information:
Allows disruption of service
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Change History
3 change records found
- show changes
Initial Analysis -
1/22/2019 10:32:52 AM
Action |
Type |
Old Value |
New Value |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:juniper:junos:14.1x53:d47:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:ex200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
Record truncated, showing 500 of 1973 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:15.1x49:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x49:d131:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*
*cp |
Added |
CPE Configuration |
|
Record truncated, showing 500 of 539 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d210:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d230:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d231:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d232:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d233:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d30:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:*
cp |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:juniper:junos:15.1x53:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d40:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d45:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1x53:d471:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:juniper:junos:15.1x53:d59:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:o:juniper:junos:15.1x53:d67:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:* |
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4738 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4738 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4626 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx5000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4738 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4626 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx5000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4735 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:18.1:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4680 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:18.2:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 4686 characters.
View Entire Change Record
AND
OR
*cpe:2.3:o:juniper:junos:18.2x75:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.2x75:d5:*:*:*:*:*:*
OR
cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
Record truncated, showing 500 of 756 characters.
View Entire Change Record
OR
*cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.1x46:d45:*:*:*:*:*:*
*cpe:2.3 |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:* |
Added |
CPE Configuration |
|
Record truncated, showing 500 of 810 characters.
View Entire Change Record
OR
*cpe:2.3:o:juniper:junos:12.3x48:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d20:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d30:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d35:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d40:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:12.3x48:d45:*:*:*:*:*:*
*cpe:2.3 |
Added |
CPE Configuration |
|
Record truncated, showing 500 of 811 characters.
View Entire Change Record
OR
*cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:15.1:r2:*:*:*: |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:* |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:* |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:* |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:* |
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:juniper:junos:17.2x75:*:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.2x75:d100:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.2x75:d50:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:17.2x75:d90:*:*:*:*:*:* |
Added |
CVSS V2 |
|
(AV:N/AC:M/Au:N/C:N/I:N/A:C) |
Added |
CVSS V3 |
|
AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
Added |
CWE |
|
CWE-476 |
Changed |
Reference Type |
http://www.securityfocus.com/bid/105701 No Types Assigned |
http://www.securityfocus.com/bid/105701 Third Party Advisory, VDB Entry |
Changed |
Reference Type |
http://www.securitytracker.com/id/1041850 No Types Assigned |
http://www.securitytracker.com/id/1041850 Third Party Advisory, VDB Entry |
Changed |
Reference Type |
https://kb.juniper.net/JSA10883 No Types Assigned |
https://kb.juniper.net/JSA10883 Vendor Advisory |
Changed |
Reference Type |
https://kb.juniper.net/KB30092 No Types Assigned |
https://kb.juniper.net/KB30092 Vendor Advisory |
CVE Modified by MITRE -
10/24/2018 6:29:03 AM
Action |
Type |
Old Value |
New Value |
Added |
Reference |
|
http://www.securityfocus.com/bid/105701 [No Types Assigned] |
CVE Modified by MITRE -
10/11/2018 6:29:02 AM
Action |
Type |
Old Value |
New Value |
Added |
Reference |
|
http://www.securitytracker.com/id/1041850 [No Types Assigned] |
Quick Info
CVE Dictionary Entry:
CVE-2018-0049
NVD Published Date:
10/10/2018
NVD Last Modified:
01/22/2019
|