Vulnerability Details : CVE-2019-0019
When BGP tracing is enabled an incoming BGP message may cause the Junos OS routing protocol daemon (rpd) process to crash and restart. While rpd restarts after a crash, repeated crashes can result in an extended DoS condition. Affected releases are Juniper Networks Junos OS: 16.1 versions prior to 16.1R7-S4, 16.1R7-S5; 16.2 versions prior to 16.2R2-S9, 16.2R3; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S1; 17.3 versions prior to 17.3R3-S3, 17.3R3-S4, 17.3R4; 17.4 versions prior to 17.4R1-S7, 17.4R2-S3, 17.4R2-S4, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4, 18.1R4; 18.2 versions prior to 18.2R2-S2, 18.2R2-S3, 18.2R3; 18.2X75 versions prior to 18.2X75-D40; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2. This issue does not affect Junos releases prior to 16.1R1.
Vulnerability category: Denial of service
Products affected by CVE-2019-0019
- cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:d5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-0019
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-0019
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Juniper Networks, Inc. | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-0019
-
The product does not release or incorrectly releases a resource before it is made available for re-use.Assigned by: sirt@juniper.net (Secondary)
References for CVE-2019-0019
-
https://kb.juniper.net/JSA10931
Juniper Networks - 2019-04 Security Bulletin: Junos OS: BGP packets can trigger rpd crash when BGP tracing is enabled. (CVE-2019-0019)Mitigation;Vendor Advisory
-
http://www.securityfocus.com/bid/107893
Juniper Junos CVE-2019-0019 Remote Denial of Service VulnerabilityBroken Link
Jump to