Vulnerability Details : CVE-2018-0030
Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2) line cards or PTX1K to crash and restart. By continuously sending specific MPLS packets, an attacker can repeatedly crash the line cards or PTX1K causing a sustained Denial of Service. Affected releases are Juniper Networks Junos OS with MPC7/8/9 or PTX-FPC3 (FPC-P1, FPC-P2) installed and PTX1K: 15.1F versions prior to 15.1F6-S10; 15.1 versions prior to 15.1R4-S9, 15.1R6-S6, 15.1R7; 16.1 versions prior to 16.1R3-S8, 16.1R4-S9, 16.1R5-S4, 16.1R6-S3, 16.1R7; 16.1X65 versions prior to 16.1X65-D46; 16.2 versions prior to 16.2R1-S6, 16.2R2-S5, 16.2R3; 17.1 versions prior to 17.1R1-S7, 17.1R2-S7, 17.1R3; 17.2 versions prior to 17.2R1-S4, 17.2R2-S4, 17.2R3; 17.2X75 versions prior to 17.2X75-D70, 17.2X75-D90; 17.3 versions prior to 17.3R1-S4, 17.3R2, 17.4 versions prior to 17.4R1-S2, 17.4R2. Refer to KB25385 for more information about PFE line cards.
Vulnerability category: Denial of service
Products affected by CVE-2018-0030
- cpe:2.3:o:juniper:junos:15.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1x65:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1x65:d30:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1x65:d35:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1x65:d40:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2x75:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2x75:d90:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-0030
0.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-0030
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2018-0030
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-0030
-
http://www.securitytracker.com/id/1041325
Juniper Junos MPLS Processing Bug in MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2), PTX3K-FPC3 Line Cards Lets Remote Users Cause the Target Line Card to Crash - SecurityTrackerThird Party Advisory;VDB Entry
-
https://kb.juniper.net/JSA10864
Juniper Networks - 2018-07 Security Bulletin: Junos OS: Junos OS: MPC7/8/9, PTX-FPC3 (FPC-P1, FPC-P2), PTX3K-FPC3 and PTX1K: Line card may crash upon receipt of specific MPLS packet (CVE-2018-0030)Vendor Advisory
-
https://kb.juniper.net/KB25385
Juniper Networks - A mapping between chipset type and PFE moduleVendor Advisory
Jump to