Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-1660 : What You Need to Know

Discover the impact of CVE-2020-1660, a vulnerability in Juniper Networks Junos MX Series devices when DNS filtering is enabled. Learn the affected versions, exploitation risks, and mitigation steps.

This CVE-2020-1660 article provides insights into a vulnerability affecting Juniper Networks Junos MX Series when DNS filtering is configured.

Understanding CVE-2020-1660

Juniper Networks Junos MX Series devices are susceptible to a specific vulnerability that can lead to service card restarts when DNS filtering is enabled.

What is CVE-2020-1660?

When DNS filtering is activated on Junos OS MX Series with specific cards, a packet stream processed by the Multiservices PIC Management Daemon (mspmand) process may crash. This situation causes the Services PIC to restart, bypassing PIC services, including DNS filtering, until full booting completion.

The Impact of CVE-2020-1660

The vulnerability can result in extended Denial of Service (DoS) attacks, leaving devices unprotected against DNS-based malicious attacks. Successful exploitation could compromise client security, exposing them to potential DNS threats.

Technical Details of CVE-2020-1660

This section delves into the specifics of the vulnerability.

Vulnerability Description

The vulnerability involves a crash in the mspmand process, leading to Services PIC restarts and bypassing DNS filtering.

Affected Systems and Versions

        Affected Versions: 17.3R3-S8, 18.3R3-S1, 18.4R3, 19.1R3, 19.2R2, 19.3R3
        Unaffected Versions: 17.4, 18.1, 18.2

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Network
        Privileges Required: None
        CVSS Base Score: 8.3 (High)

Mitigation and Prevention

Protecting systems from CVE-2020-1660 entails specific actions to mitigate the vulnerability.

Immediate Steps to Take

        Update affected software to versions 17.3R3-S8, 18.3R3-S1, 18.4R3, 19.1R3, 19.2R2, 19.3R3, 19.4R1, or later.
        Follow vendor guidelines for patching and updates.

Long-Term Security Practices

        Implement robust network security protocols.
        Conduct regular vulnerability assessments.
        Enhance DNS filtering configurations to prevent similar exploits.

Patching and Updates

        Apply Juniper Networks' released software updates that address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now