Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-3817


Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D32, 12.1X45 before 12.1X45-D25, 12.1X46 before 12.1X46-D20, and 12.1X47 before 12.1X47-D10 on SRX Series devices, when NAT protocol translation from IPv4 to IPv6 is enabled, allows remote attackers to cause a denial of service (flowd hang or crash) via a crafted packet.


Published

2014-07-11T20:55:02.577

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System juniper junos 11.4 Yes
Operating System juniper junos 12.1x44 Yes
Operating System juniper junos 12.1x45 Yes
Operating System juniper junos 12.1x46 Yes
Operating System juniper junos 12.1x47 Yes
Hardware juniper srx100 - Yes
Hardware juniper srx110 - Yes
Hardware juniper srx1400 - Yes
Hardware juniper srx210 - Yes
Hardware juniper srx220 - Yes
Hardware juniper srx240 - Yes
Hardware juniper srx3400 - Yes
Hardware juniper srx3600 - Yes
Hardware juniper srx550 - Yes
Hardware juniper srx5600 - Yes
Hardware juniper srx5800 - Yes
Hardware juniper srx650 - Yes

References