Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: SRX cluster denial of service vulnerability in flowd due to multicast packets (JSA10821) (CVE-2017-10619)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Juniper Junos OS: SRX cluster denial of service vulnerability in flowd due to multicast packets (JSA10821) (CVE-2017-10619)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
10/13/2017
Created
07/25/2018
Added
04/25/2018
Modified
03/21/2022

Description

When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled by default and is only supported in high-end SRX platforms. Affected releases are Juniper Networks Junos OS 12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80 on SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;