var-201901-1604
Vulnerability from variot
The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series. Juniper Networks Junos OS Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a security weaknesss. An attacker can exploit this weakness to predict IP ID sequence numbers and bypass certain security restrictions. Junos OS is a set of operating systems running on it. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201901-1604", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "15.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1f5" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "15.1" }, { "model": "junos 15.1f4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s19", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s18", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s16", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1a2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null } ], "sources": [ { "db": "BID", "id": "106564" }, { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "NVD", "id": "CVE-2019-0007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:juniper:junos", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001711" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "106564" } ], "trust": 0.3 }, "cve": "CVE-2019-0007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-0007", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-140038", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-0007", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "sirt@juniper.net", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2019-0007", "impactScore": 4.7, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-0007", "trust": 1.0, "value": "CRITICAL" }, { "author": "sirt@juniper.net", "id": "CVE-2019-0007", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-0007", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201901-368", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-140038", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-0007", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-140038" }, { "db": "VULMON", "id": "CVE-2019-0007" }, { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "CNNVD", "id": "CNNVD-201901-368" }, { "db": "NVD", "id": "CVE-2019-0007" }, { "db": "NVD", "id": "CVE-2019-0007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vMX Series software uses a predictable IP ID Sequence Number. This leaves the system as well as clients connecting through the device susceptible to a family of attacks which rely on the use of predictable IP ID sequence numbers as their base method of attack. This issue was found during internal product security testing. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1F5 on vMX Series. Juniper Networks Junos OS Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Juniper Junos is prone to a security weaknesss. \nAn attacker can exploit this weakness to predict IP ID sequence numbers and bypass certain security restrictions. Junos OS is a set of operating systems running on it. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2019-0007" }, { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "BID", "id": "106564" }, { "db": "VULHUB", "id": "VHN-140038" }, { "db": "VULMON", "id": "CVE-2019-0007" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0007", "trust": 2.9 }, { "db": "JUNIPER", "id": "JSA10903", "trust": 2.1 }, { "db": "BID", "id": "106564", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2019-001711", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201901-368", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-140038", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-0007", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140038" }, { "db": "VULMON", "id": "CVE-2019-0007" }, { "db": "BID", "id": "106564" }, { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "CNNVD", "id": "CNNVD-201901-368" }, { "db": "NVD", "id": "CVE-2019-0007" } ] }, "id": "VAR-201901-1604", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-140038" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:32:47.695000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10903", "trust": 0.8, "url": "https://kb.juniper.net/JSA10903" }, { "title": "Juniper vMX series Junos OS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88531" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "CNNVD", "id": "CNNVD-201901-368" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-330", "trust": 1.1 }, { "problemtype": "CWE-254", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-140038" }, { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "NVD", "id": "CVE-2019-0007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/106564" }, { "trust": 1.8, "url": "https://kb.juniper.net/jsa10903" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0007" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0007" }, { "trust": 0.3, "url": "https://www.juniper.net/us/en/" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10903\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/330.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-140038" }, { "db": "VULMON", "id": "CVE-2019-0007" }, { "db": "BID", "id": "106564" }, { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "CNNVD", "id": "CNNVD-201901-368" }, { "db": "NVD", "id": "CVE-2019-0007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-140038" }, { "db": "VULMON", "id": "CVE-2019-0007" }, { "db": "BID", "id": "106564" }, { "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "db": "CNNVD", "id": "CNNVD-201901-368" }, { "db": "NVD", "id": "CVE-2019-0007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-01-15T00:00:00", "db": "VULHUB", "id": "VHN-140038" }, { "date": "2019-01-15T00:00:00", "db": "VULMON", "id": "CVE-2019-0007" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106564" }, { "date": "2019-03-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "date": "2019-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-368" }, { "date": "2019-01-15T21:29:01.087000", "db": "NVD", "id": "CVE-2019-0007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-140038" }, { "date": "2020-08-24T00:00:00", "db": "VULMON", "id": "CVE-2019-0007" }, { "date": "2019-01-09T00:00:00", "db": "BID", "id": "106564" }, { "date": "2019-03-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001711" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-368" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-0007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-368" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Networks Junos OS Vulnerabilities related to security functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001711" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-368" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.