Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-0030 : What You Need to Know

Learn about CVE-2018-0030 affecting Juniper Networks Junos OS, leading to line card crashes upon receiving specific MPLS packets. Find mitigation steps and impacted versions here.

Junos OS: MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) and PTX1K: Line card may crash upon receipt of specific MPLS packet.

Understanding CVE-2018-0030

This CVE involves a vulnerability in Juniper Networks Junos OS that could lead to the crashing and restarting of specific line cards or devices upon receiving a particular MPLS packet.

What is CVE-2018-0030?

        The vulnerability allows an attacker to repeatedly crash MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards, or PTX1K devices by sending specific MPLS packets, resulting in a Denial of Service.

The Impact of CVE-2018-0030

        Attack Vector: Network
        Attack Complexity: Low
        Privileges Required: None
        Availability Impact: High
        Base Score: 7.5 (High)

Technical Details of CVE-2018-0030

Vulnerability Description

        Receiving a specific MPLS packet can crash and restart MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards, or PTX1K devices, leading to a persistent Denial of Service.

Affected Systems and Versions

        Junos OS versions prior to 15.1F6-S10, 15.1R4-S9, 15.1R6-S6, 15.1R7, 16.1R3-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7, 16.1X65-D46, 16.2R1-S6, 16.2R2-S5, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R2-S4, 17.2R3, 17.2X75-D70, 17.3R1-S4, 17.3R2, 17.4R1-S2, 17.4R2 are affected.

Exploitation Mechanism

        Juniper SIRT has not detected any malicious exploitation of this vulnerability.

Mitigation and Prevention

Immediate Steps to Take

        Update to the fixed software releases: 12.1X46-D77, 12.3X48-D70, 14.1X53-D47, 15.1F6-S10, 15.1R4-S9, 15.1R6-S6, 15.1R7, 15.1X49-D140, 15.1X53-D471, 15.1X53-D59, 15.1X53-D67, 16.1R3-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7, 16.1X65-D46, 16.2R1-S6, 16.2R2-S5, 16.2R3, 17.1R1-S7, 17.1R2-S7, 17.1R3, 17.2R1-S4, 17.2R2-S4, 17.2R3, 17.2X75-D70, 17.3R1-S4, 17.3R2, 17.4R1-S2, 17.4R2, 18.1R1, 18.1X75-D10, or subsequent releases.

Long-Term Security Practices

        Regularly update Junos OS to the latest versions to ensure protection against known vulnerabilities.

Patching and Updates

        Apply patches and updates provided by Juniper Networks to address this specific vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now