Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-6014


Juniper Junos 10.4 before 10.4S15, 11.4 before 11.4R9, 11.4X27 before 11.4X27.44, 12.1 before 12.1R7, 12.1X44 before 12.1X44-D20, 12.1X45 before 12.1X45-D15, 12.2 before 12.2R6, 12.3 before 12.3R3, 13.1 before 13.1R3, and 13.2 before 13.2R1, when Proxy ARP is enabled on an unnumbered interface, allows remote attackers to perform ARP poisoning attacks and possibly obtain sensitive information via a crafted ARP message.


Published

2013-10-28T22:55:04.133

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 9.3 (CRITICAL)

CVSSv2 Vector

AV:A/AC:L/Au:N/C:N/I:C/A:N

  • Access Vector: ADJACENT_NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: COMPLETE
  • Availability Impact: NONE
Exploitability Score

6.5

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System juniper junos 10.4 Yes
Operating System juniper junos 11.4 Yes
Operating System juniper junos 11.4x27 Yes
Operating System juniper junos 12.1 Yes
Operating System juniper junos 12.1x44 Yes
Operating System juniper junos 12.1x45 Yes
Operating System juniper junos 12.2 Yes
Operating System juniper junos 12.3 Yes
Operating System juniper junos 13.1 Yes
Operating System juniper junos 13.2 Yes

References