Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-0014 : Exploit Details and Defense Strategies

Learn about CVE-2019-0014, a high-severity vulnerability in Junos OS affecting QFX and PTX Series devices. Find out the impact, affected versions, and mitigation steps.

A vulnerability in Junos OS affecting QFX and PTX Series devices could lead to a Denial of Service (DoS) attack by crashing the FPC process.

Understanding CVE-2019-0014

This CVE involves a specific issue in Junos OS that impacts the FPC process on QFX and PTX Series devices when processing J-Flow packets.

What is CVE-2019-0014?

When a malformed packet is received for J-Flow sampling, it can cause the FPC process to crash, resulting in the shutdown of all interfaces on the affected devices. This vulnerability can be exploited by an attacker to launch a sustained DoS attack.

The Impact of CVE-2019-0014

        Severity: High
        CVSS Base Score: 7.5
        Attack Vector: Network
        Availability Impact: High
        Affected Systems: QFX and PTX Series

Technical Details of CVE-2019-0014

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability allows an attacker to crash the FPC process on QFX and PTX Series devices by sending a malformed packet for J-Flow sampling.

Affected Systems and Versions

        Affected Platforms: QFX and PTX Series
        Affected Versions:
              Junos OS 17.4 versions prior to 17.4R2-S1, 17.4R3
              Junos OS 18.1 versions prior to 18.1R3-S1
              Junos OS 18.2 versions prior to 18.2R1-S3, 18.2R2
              Junos OS 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D100

Exploitation Mechanism

        The vulnerability can be exploited by continuously sending malicious packets for J-Flow sampling, leading to a sustained DoS attack.

Mitigation and Prevention

Effective measures to mitigate and prevent exploitation of this vulnerability.

Immediate Steps to Take

        Disable the functionality of learning next-hop addresses in the affected configurations.

Long-Term Security Practices

        Regularly update Junos OS to the latest patched versions.

Patching and Updates

        Update to the following software releases to address the vulnerability: Junos OS 17.2X75-D91, 17.2X75-D100, 17.4R2-S1, 17.4R3, 18.1R3-S1, 18.2R1-S3, 18.2R2, 18.2X75-D5, 18.3R1, and all subsequent releases.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now