Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD
Receipt of a specific Draft-Rosen MVPN control packet may cause the routing protocol daemon (RPD) process to crash and restart or may lead to remote code execution. By continuously sending the same specific Draft-Rosen MVPN control packet, an attacker can repeatedly crash the RPD process causing a prolonged denial of service. This issue may occur when the Junos OS device is configured for…
| Vendor | Product | Versions |
|---|---|---|
| Juniper Networks | Junos OS | 12.1X46, 12.3X48, 15.1X49 |
| Juniper Networks | Junos OS | 15.1F6, 12.3, 15.1, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1 |
| Juniper Networks | Junos OS | 15.1X53 |
| Juniper Networks | Junos OS | 15.1X53 |
| Juniper Networks | Junos OS | 15.1X53 |
| Juniper Networks | Junos OS | 15.1X53 |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.