Juniper Networks QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600 devices running Junos OS 14.1X53 prior to 14.1X53-D40, 15.1X53 prior to 15.1X53-D40, 15.1 prior to 15.1R2, do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is also known as 'Etherleak'
Published 2017-05-30 14:29:01
Updated 2019-05-10 14:11:58
View at NVD,   CVE.org
Vulnerability category: Information leak

Products affected by CVE-2017-2304

Exploit prediction scoring system (EPSS) score for CVE-2017-2304

0.19%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2017-2304

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
5.0
MEDIUM AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
NIST
7.5
HIGH CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.9
3.6
NIST

CWE ids for CVE-2017-2304

References for CVE-2017-2304

  • https://kb.juniper.net/JSA10773
    Juniper Networks - 2017-01 Security Bulletin: QFX3500, QFX3600, QFX5100, QFX5200, EX4300 and EX4600: 'Etherleak' memory disclosure in Ethernet padding data (CVE-2017-2304)
    Vendor Advisory
  • http://www.securityfocus.com/bid/95403
    Multiple Juniper Products Ethernet Packet CVE-2017-2304 Information Disclosure Vulnerability
    Third Party Advisory;VDB Entry
  • http://www.securitytracker.com/id/1037593
    Juniper Junos Ethernet Frame Padding Flaw Lets Remote Users Obtain Potentially Sensitive Information on the Target System - SecurityTracker
    Third Party Advisory;VDB Entry
Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!