A Denial of Service vulnerability exists in the Juniper Networks Junos OS JDHCPD daemon which allows an attacker to core the JDHCPD daemon by sending a crafted IPv6 packet to the system. This issue is limited to systems which receives IPv6 DHCP packets on a system configured for
A Denial of Service vulnerability exists in the Juniper Networks Junos OS JDHCPD daemon which allows an attacker to core the JDHCPD daemon by sending a crafted IPv6 packet to the system. This issue is limited to systems which receives IPv6 DHCP packets on a system configured for DHCP processing using the JDHCPD daemon. This issue does not affect IPv4 DHCP packet processing. Affected releases are…
| Vendor | Product | Versions |
|---|---|---|
| Juniper Networks | Junos OS | 12.3X48, 15.1X49 |
| Juniper Networks | Junos OS | 14.1X53 |
| Juniper Networks | Junos OS | 14.1X53 |
| Juniper Networks | Junos OS | 15.1, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4 |
| Juniper Networks | Junos OS | 15.1X53 |
| Juniper Networks | Junos OS | 15.1X53 |
| Juniper Networks | Junos OS | 15.1X53 |
| Juniper Networks | Junos OS | 12.3 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.