Vulnerability Details : CVE-2020-1665
On Juniper Networks MX Series and EX9200 Series, in a certain condition the IPv6 Distributed Denial of Service (DDoS) protection might not take affect when it reaches the threshold condition. The DDoS protection allows the device to continue to function while it is under DDoS attack, protecting both the Routing Engine (RE) and the Flexible PIC Concentrator (FPC) during the DDoS attack. When this issue occurs, the RE and/or the FPC can become overwhelmed, which could disrupt network protocol operations and/or interrupt traffic. This issue does not affect IPv4 DDoS protection. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX series and EX9200 Series: 17.2 versions prior to 17.2R3-S4; 17.2X75 versions prior to 17.2X75-D102, 17.2X75-D110; 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.2 versions prior to 18.2R2-S7, 18.2R3, 18.2R3-S3; 18.2X75 versions prior to 18.2X75-D30; 18.3 versions prior to 18.3R2-S4, 18.3R3-S2.
Vulnerability category: Denial of service
Products affected by CVE-2020-1665
- cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2x75:d50:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:d20:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2x75:d70:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2x75:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2x75:d92:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.2x75:d12:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-1665
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-1665
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
Juniper Networks, Inc. |
CWE ids for CVE-2020-1665
-
The product receives data from an upstream component, but does not filter all instances of a special element before sending it to a downstream component.Assigned by: sirt@juniper.net (Secondary)
References for CVE-2020-1665
-
https://kb.juniper.net/KB25385
Juniper Networks - A mapping between chipset type and PFE moduleVendor Advisory
-
https://kb.juniper.net/JSA11062
2020-10 Security Bulletin: Junos OS: MX series/EX9200 Series: IPv6 DDoS protection does not work as expected. (CVE-2020-1665) - Juniper NetworksVendor Advisory
Jump to