Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-0618


Juniper Junos before 10.4 before 10.4R16, 11.4 before 11.4R8, 12.1R before 12.1R7, 12.1X44 before 12.1X44-D20, and 12.1X45 before 12.1X45-D10 on SRX Series service gateways, when used as a UAC enforcer and captive portal is enabled, allows remote attackers to cause a denial of service (flowd crash) via a crafted HTTP message.


Published

2014-01-11T04:44:42.617

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System juniper junos 10.4 Yes
Operating System juniper junos 11.4 Yes
Operating System juniper junos 12.1r Yes
Operating System juniper junos 12.1x44 Yes
Operating System juniper junos 12.1x45 Yes
Hardware juniper srx100 - Yes
Hardware juniper srx110 - Yes
Hardware juniper srx1400 - Yes
Hardware juniper srx210 - Yes
Hardware juniper srx220 - Yes
Hardware juniper srx240 - Yes
Hardware juniper srx3400 - Yes
Hardware juniper srx3600 - Yes
Hardware juniper srx550 - Yes
Hardware juniper srx5600 - Yes
Hardware juniper srx5800 - Yes
Hardware juniper srx650 - Yes

References