Vulnerability Description
When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain multicast packets might cause the flowd process to crash, halting or interrupting traffic from flowing through the device and triggering RG1+ (data-plane) fail-over to the secondary node. Repeated crashes of the flowd process may constitute an extended denial of service condition. This service is not enabled by default and is only supported in high-end SRX platforms. Affected releases are Juniper Networks Junos OS 12.3X48 prior to 12.3X48-D45, 15.1X49 prior to 15.1X49-D80 on SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 12.3x48 |
| Juniper | Srx1400 | - |
| Juniper | Srx3400 | - |
| Juniper | Srx3600 | - |
| Juniper | Srx5400 | - |
| Juniper | Srx5600 | - |
| Juniper | Srx5800 | - |
References
- https://kb.juniper.net/JSA10821Vendor Advisory
- https://kb.juniper.net/JSA10821Vendor Advisory
FAQ
What is CVE-2017-10619?
CVE-2017-10619 is a vulnerability with a CVSS score of 7.5 (HIGH). When Express Path (formerly known as service offloading) is configured on Juniper Networks SRX1400, SRX3400, SRX3600, SRX5400, SRX5600, SRX5800 in high availability cluster configuration mode, certain...
How severe is CVE-2017-10619?
CVE-2017-10619 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-10619?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Srx1400, Juniper Srx3400, Juniper Srx3600, Juniper Srx5400.