Vulnerability Details : CVE-2014-6383
The stateless firewall in Juniper Junos 13.3R3, 14.1R1, and 14.1R2, when using Trio-based PFE modules, does not properly match ports, which might allow remote attackers to bypass firewall rule.
Products affected by CVE-2014-6383
- cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-6383
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-6383
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-6383
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-6383
-
http://www.securityfocus.com/bid/72071
Juniper Junos CVE-2014-6383 Security Bypass Vulnerability
-
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10666
Juniper Networks - 2015-01 Security Bulletin: Junos: Firewall filter fails to match on port (CVE-2014-6383)Vendor Advisory
-
http://www.securitytracker.com/id/1031549
Juniper Junos Does Not Properly Enforce IPv4 Stateless Port Matching Filters - SecurityTracker
Jump to