Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-2347 : Vulnerability Insights and Analysis

Learn about CVE-2017-2347, a denial of service vulnerability in Juniper Networks Junos OS rpd daemon. Find out impacted versions and mitigation steps.

A denial of service vulnerability in the rpd daemon of Juniper Networks Junos OS allows a maliciously crafted MPLS ping packet to crash the rpd daemon if MPLS OAM is configured, potentially leading to a prolonged denial of service situation.

Understanding CVE-2017-2347

This CVE affects Juniper Networks Junos OS versions specified below.

What is CVE-2017-2347?

This vulnerability in the rpd daemon of Juniper Networks Junos OS can be exploited by a specially crafted MPLS ping packet to crash the rpd daemon when MPLS OAM is configured.

The Impact of CVE-2017-2347

        CVSS Base Score: 6.5 (Medium)
        Attack Vector: Adjacent Network
        Availability Impact: High
        No impact on Confidentiality or Integrity
        No privileges required for exploitation

Technical Details of CVE-2017-2347

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability allows a malicious MPLS ping packet to crash the rpd daemon when MPLS OAM is configured.

Affected Systems and Versions

The following Junos OS versions are affected:

        Junos OS 12.3X48 prior to 12.3X48-D50, 12.3X48-D55
        Junos OS 13.3 prior to 13.3R10
        Junos OS 14.1 prior to 14.1R4-S13, 14.1R8-S3, 14.1R9
        Junos OS 14.1X53 prior to 14.1X53-D42, 14.1X53-D50
        Junos OS 14.2 prior to 14.2R4-S8, 14.2R7-S6, 14.2R8
        Junos OS 15.1 prior to 15.1F2-S14, 15.1F5-S7, 15.1F6-S4, 15.1F7, 15.1R4-S7, 15.1R5-S1, 15.1R6
        Junos OS 15.1X49 prior to 15.1X49-D100
        Junos OS 15.1X53 prior to 15.1X53-D105, 15.1X53-D47, 15.1X53-D62, 15.1X53-D70
        Junos OS 16.1 prior to 16.1R3-S3, 16.1R4

Exploitation Mechanism

This issue affects devices where MPLS OAM is configured, allowing a crafted MPLS ping packet to trigger the rpd daemon crash.

Mitigation and Prevention

Steps to address and prevent exploitation of CVE-2017-2347.

Immediate Steps to Take

        Update affected Junos OS versions to the patched releases.

Long-Term Security Practices

        Limit access to the router to trusted administrative networks or hosts.

Patching and Updates

        Ensure all affected Junos OS versions are updated to the fixed releases.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now