Juniper Junos up to 14.2 1 OSPFv3 IPsec Authentication Header denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Juniper Junos up to 14.2 1. It has been rated as problematic. Affected by this issue is some unknown functionality of the component OSPFv3 Handler. Performing a manipulation as part of IPsec Authentication Header results in denial of service. This vulnerability is reported as CVE-2014-6385. The attacker must have access to the local network to execute the attack. No exploit exists.
Details
A vulnerability, which was classified as problematic, was found in Juniper Junos up to 14.2 1 (Router Operating System). This affects an unknown function of the component OSPFv3 Handler. The manipulation as part of a IPsec Authentication Header leads to a denial of service vulnerability. CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. This is going to have an impact on availability.
The weakness was disclosed 01/14/2015 as JSA10668 as confirmed advisory (Website). The advisory is shared at kb.juniper.net. This vulnerability is uniquely identified as CVE-2014-6385 since 09/11/2014. The attack needs to approached within the local network. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 80956 , which helps to determine the existence of the flaw in a target environment. It is . The commercial vulnerability scanner Qualys is able to test this issue with plugin 43545 (Juniper JUNOS Denial of Service (kernel crash and restart) Vulnerability (JSA10668)).
The vulnerability is also documented in the databases at X-Force (100235), Tenable (80956), SecurityFocus (BID 72072†) and Vulnerability Center (SBV-48058†). The entry VDB-68816 is pretty similar. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.juniper.net/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.7
VulDB Base Score: 6.5
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 80956
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Port: 🔍
OpenVAS ID: 802738
OpenVAS Name: Junos OSPFv3 Denial of Service Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
09/11/2014 🔍01/14/2015 🔍
01/14/2015 🔍
01/14/2015 🔍
01/15/2015 🔍
01/16/2015 🔍
01/23/2015 🔍
01/25/2015 🔍
03/05/2022 🔍
Sources
Vendor: juniper.netAdvisory: JSA10668
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-6385 (🔍)
GCVE (CVE): GCVE-0-2014-6385
GCVE (VulDB): GCVE-100-68817
X-Force: 100235 - Juniper Junos OSPFv3 denial of service, Medium Risk
SecurityFocus: 72072 - Juniper Junos CVE-2014-6385 Denial of Service Vulnerability
Vulnerability Center: 48058 - Juniper JunOS Remote DoS via a Specially Crafted Fragmented OSPFv3 Packet, Medium
See also: 🔍
Entry
Created: 01/25/2015 23:29Updated: 03/05/2022 20:41
Changes: 01/25/2015 23:29 (70), 04/29/2019 07:04 (5), 03/05/2022 20:33 (2), 03/05/2022 20:41 (1)
Complete: 🔍
Cache ID: 216:0F9:103
No comments yet. Languages: en.
Please log in to comment.