HIGH · 7.1

CVE-2014-6382

The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, ...

Vulnerability Description

The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, allows remote attackers to cause a denial of service (jpppd crash and restart) by sending a crafted PAP Authenticate-Request after the PPPoE Discovery and LCP phase are complete.

CVSS Score

7.1

HIGH

AV:N/AC:M/Au:N/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
JuniperJunos13.3
JuniperMx10All versions
JuniperMx104All versions
JuniperMx2010All versions
JuniperMx2020All versions
JuniperMx240All versions
JuniperMx40All versions
JuniperMx480All versions
JuniperMx80All versions
JuniperMx960All versions
JuniperVmxAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-6382?

CVE-2014-6382 is a vulnerability with a CVSS score of 7.1 (HIGH). The Juniper MX Series routers with Junos 13.3R3 through 13.3Rx before 13.3R6, 14.1 before 14.1R4, 14.1X50 before 14.1X50-D70, and 14.2 before 14.2R2, when configured as a broadband edge (BBE) router, ...

How severe is CVE-2014-6382?

CVE-2014-6382 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-6382?

Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Mx10, Juniper Mx104, Juniper Mx2010, Juniper Mx2020.