CVE-2017-10611 (GCVE-0-2017-10611)

Vulnerability from cvelistv5 – Published: 2017-10-13 17:00 – Updated: 2024-09-16 19:56
VLAI?
Title
Junos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with 'extended-statistics' enabled
Summary
If extended statistics are enabled via 'set chassis extended-statistics', when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if 'extended-statistics' are enabled under the [edit chassis] configuration. Affected releases are Juniper Networks Junos OS 14.1 prior to 14.1R8-S5, 14.1R9 on MX Series; 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 on EX2200, EX3300, XRE200; 14.2 prior to 14.2R7-S9, 14.2R8 on MX Series; 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6 on MX Series; 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6 on MX Series; 16.1X65 prior to 16.1X65-D45 on EX2200, EX3300, XRE200; 16.2 prior to 16.2R2-S1, 16.2R3 on MX Series; 17.1 prior to 17.1R2-S2, 17.1R3 on MX Series; 17.2 prior to 17.2R1-S3, 17.2R2 on MX Series; 17.2X75 prior to 17.2X75-D50 on MX Series; 17.3 prior to 17.3R1-S1, 17.3R2 on MX Series. No other Juniper Networks products or platforms are affected by this issue.
CWE
  • Denial of service
Assigner
References
https://kb.juniper.net/JSA10814 x_refsource_CONFIRM
Impacted products
Vendor Product Version
Juniper Networks Junos OS Affected: 14.1 prior to 14.1R8-S5, 14.1R9
Affected: 14.2 prior to 14.2R7-S9, 14.2R8
Affected: 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6
Affected: 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6
Affected: 16.2 prior to 16.2R2-S1, 16.2R3
Affected: 17.1 prior to 17.1R2-S2, 17.1R3
Affected: 17.2 prior to 17.2R1-S3, 17.2R2
Affected: 17.2X75 prior to 17.2X75-D50
Affected: 17.3 prior to 17.3R1-S1, 17.3R2
Create a notification for this product.
    Juniper Networks Junos OS Affected: 14.1X53 prior to 14.1X53-D46, 14.1X53-D50
Affected: 16.1X65 prior to 16.1X65-D45
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:41:55.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kb.juniper.net/JSA10814"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "MX Series"
          ],
          "product": "Junos OS",
          "vendor": "Juniper Networks",
          "versions": [
            {
              "status": "affected",
              "version": "14.1 prior to 14.1R8-S5, 14.1R9"
            },
            {
              "status": "affected",
              "version": "14.2 prior to 14.2R7-S9, 14.2R8"
            },
            {
              "status": "affected",
              "version": "15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6"
            },
            {
              "status": "affected",
              "version": "16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6"
            },
            {
              "status": "affected",
              "version": "16.2 prior to 16.2R2-S1, 16.2R3"
            },
            {
              "status": "affected",
              "version": "17.1 prior to 17.1R2-S2, 17.1R3"
            },
            {
              "status": "affected",
              "version": "17.2 prior to 17.2R1-S3, 17.2R2"
            },
            {
              "status": "affected",
              "version": "17.2X75 prior to 17.2X75-D50"
            },
            {
              "status": "affected",
              "version": "17.3 prior to 17.3R1-S1, 17.3R2"
            }
          ]
        },
        {
          "platforms": [
            "EX2200, EX3300, XRE200"
          ],
          "product": "Junos OS",
          "vendor": "Juniper Networks",
          "versions": [
            {
              "status": "affected",
              "version": "14.1X53 prior to 14.1X53-D46, 14.1X53-D50"
            },
            {
              "status": "affected",
              "version": "16.1X65 prior to 16.1X65-D45"
            }
          ]
        }
      ],
      "datePublic": "2017-10-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "If extended statistics are enabled via \u0027set chassis extended-statistics\u0027, when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if \u0027extended-statistics\u0027 are enabled under the [edit chassis] configuration. Affected releases are Juniper Networks Junos OS 14.1 prior to 14.1R8-S5, 14.1R9 on MX Series; 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 on EX2200, EX3300, XRE200; 14.2 prior to 14.2R7-S9, 14.2R8 on MX Series; 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6 on MX Series; 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6 on MX Series; 16.1X65 prior to 16.1X65-D45 on EX2200, EX3300, XRE200; 16.2 prior to 16.2R2-S1, 16.2R3 on MX Series; 17.1 prior to 17.1R2-S2, 17.1R3 on MX Series; 17.2 prior to 17.2R1-S3, 17.2R2 on MX Series; 17.2X75 prior to 17.2X75-D50 on MX Series; 17.3 prior to 17.3R1-S1, 17.3R2 on MX Series. No other Juniper Networks products or platforms are affected by this issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-13T16:57:01.000Z",
        "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
        "shortName": "juniper"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kb.juniper.net/JSA10814"
        }
      ],
      "title": "Junos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with \u0027extended-statistics\u0027 enabled",
      "workarounds": [
        {
          "lang": "en",
          "value": "Disable chassis extended-statistics.\n\nUse access lists or firewall filters to limit access to the router via SNMP or CLI only from trusted hosts and administrators."
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@juniper.net",
          "DATE_PUBLIC": "2017-10-11T09:00",
          "ID": "CVE-2017-10611",
          "STATE": "PUBLIC",
          "TITLE": "Junos: EX Series PFE and MX MPC7E/8E/9E PFE crash when fetching interface stats with \u0027extended-statistics\u0027 enabled"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Junos OS",
                      "version": {
                        "version_data": [
                          {
                            "platform": "MX Series",
                            "version_value": "14.1 prior to 14.1R8-S5, 14.1R9"
                          },
                          {
                            "platform": "EX2200, EX3300, XRE200",
                            "version_value": "14.1X53 prior to 14.1X53-D46, 14.1X53-D50"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "14.2 prior to 14.2R7-S9, 14.2R8"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6"
                          },
                          {
                            "platform": "EX2200, EX3300, XRE200",
                            "version_value": "16.1X65 prior to 16.1X65-D45"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "16.2 prior to 16.2R2-S1, 16.2R3"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "17.1 prior to 17.1R2-S2, 17.1R3"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "17.2 prior to 17.2R1-S3, 17.2R2"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "17.2X75 prior to 17.2X75-D50"
                          },
                          {
                            "platform": "MX Series",
                            "version_value": "17.3 prior to 17.3R1-S1, 17.3R2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Juniper Networks"
              }
            ]
          }
        },
        "configuration": [],
        "credit": [],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "If extended statistics are enabled via \u0027set chassis extended-statistics\u0027, when executing any operation that fetches interface statistics, including but not limited to SNMP GET requests, the pfem process or the FPC may crash and restart. Repeated crashes of PFE processing can result in an extended denial of service condition. This issue only affects the following platforms: (1) EX2200, EX3300, XRE200 (2) MX Series routers with MPC7E/8E/9E PFEs installed, and only if \u0027extended-statistics\u0027 are enabled under the [edit chassis] configuration. Affected releases are Juniper Networks Junos OS 14.1 prior to 14.1R8-S5, 14.1R9 on MX Series; 14.1X53 prior to 14.1X53-D46, 14.1X53-D50 on EX2200, EX3300, XRE200; 14.2 prior to 14.2R7-S9, 14.2R8 on MX Series; 15.1 prior to 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6 on MX Series; 16.1 prior to 16.1R4-S5, 16.1R5, 16.1R6 on MX Series; 16.1X65 prior to 16.1X65-D45 on EX2200, EX3300, XRE200; 16.2 prior to 16.2R2-S1, 16.2R3 on MX Series; 17.1 prior to 17.1R2-S2, 17.1R3 on MX Series; 17.2 prior to 17.2R1-S3, 17.2R2 on MX Series; 17.2X75 prior to 17.2X75-D50 on MX Series; 17.3 prior to 17.3R1-S1, 17.3R2 on MX Series. No other Juniper Networks products or platforms are affected by this issue."
            }
          ]
        },
        "exploit": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability, however, the issue has been seen in a production network.",
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.juniper.net/JSA10814",
              "refsource": "CONFIRM",
              "url": "https://kb.juniper.net/JSA10814"
            }
          ]
        },
        "solution": "The following software releases have been updated to resolve this specific issue: 14.1R8-S5, 14.1R9, 14.1X53-D46, 14.1X53-D50, 14.2R7-S9, 14.2R8, 15.1F5-S8, 15.1F6-S8, 15.1R5-S3, 15.1R6, 16.1R4-S5, 16.1R5, 16.1X65-D45, 16.2R2-S1, 16.2R3, 17.1R2-S2, 17.1R3, 17.2R1-S3, 17.2R2, 17.2X75-D50, 17.3R1-S1, 17.3R2, 17.4R1, and all subsequent releases.\n\nThis issue is being tracked as PR 1247026 and is visible on the Customer Support website.",
        "work_around": [
          {
            "lang": "en",
            "value": "Disable chassis extended-statistics.\n\nUse access lists or firewall filters to limit access to the router via SNMP or CLI only from trusted hosts and administrators."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
    "assignerShortName": "juniper",
    "cveId": "CVE-2017-10611",
    "datePublished": "2017-10-13T17:00:00.000Z",
    "dateReserved": "2017-06-28T00:00:00.000Z",
    "dateUpdated": "2024-09-16T19:56:41.246Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…