Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-2348 : Security Advisory and Response

Learn about CVE-2017-2348 affecting Juniper's Enhanced jdhcpd daemon, leading to denial of service due to high CPU usage or crashes from invalid IPv6 UDP packets. Find mitigation steps and software updates.

The Juniper Enhanced jdhcpd daemon may experience issues when receiving invalid IPv6 UDP packets, potentially leading to a denial of service. This vulnerability affects various Junos OS versions on different platforms.

Understanding CVE-2017-2348

This CVE involves a vulnerability in the Juniper Enhanced jdhcpd daemon that can cause high CPU utilization or crashes upon receiving invalid IPv6 UDP packets, impacting the DHCP service.

What is CVE-2017-2348?

The Juniper Enhanced jdhcpd daemon vulnerability can result in denial of service due to high CPU usage or repeated crashes when processing invalid IPv6 UDP packets.

The Impact of CVE-2017-2348

        Severity: High (CVSS Base Score: 7.5)
        Attack Vector: Network
        Availability Impact: High
        No impact on Confidentiality or Integrity

Technical Details of CVE-2017-2348

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability in the Juniper Enhanced jdhcpd daemon can lead to denial of service by causing high CPU utilization or crashes when processing invalid IPv6 UDP packets.

Affected Systems and Versions

        Junos OS 14.1X53 versions prior to 14.1X53-D12, 14.1X53-D38, 14.1X53-D40 on QFX, EX, QFabric System
        Junos OS 15.1 versions prior to 15.1F2-S18, 15.1R4 on all products and platforms
        Junos OS 15.1X49 versions prior to 15.1X49-D80 on SRX
        Junos OS 15.1X53 versions prior to 15.1X53-D51, 15.1X53-D60 on NFX, QFX, EX

Exploitation Mechanism

The vulnerability can be exploited by sending invalid IPv6 UDP packets to devices with the Enhanced jdhcpd service enabled, causing high CPU usage or crashes.

Mitigation and Prevention

Steps to address and prevent the CVE-2017-2348 vulnerability.

Immediate Steps to Take

        Transition devices from Enhanced DHCP server to Legacy DHCP if supported
        Disable DHCP services or forward requests to other DHCP servers if transitioning is not possible

Long-Term Security Practices

        Regularly update Junos OS to patched versions
        Monitor CPU utilization and jdhcpd daemon behavior for anomalies

Patching and Updates

        Update to fixed software releases: 14.1X53-D12, 14.1X53-D38, 14.1X53-D40, 15.1F2-S18, 15.1R4, 15.1X49-D80, 15.1X53-D51, 15.1X53-D60, 16.1R1, and later
        Track progress on PR 1119019 via the Customer Support website

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now