{ "CVE_data_meta" : { "ASSIGNER" : "sirt@juniper.net", "DATE_PUBLIC" : "2018-07-11T16:00:00.000Z", "ID" : "CVE-2018-0026", "STATE" : "PUBLIC", "TITLE" : " Junos OS: Stateless IP firewall filter rules stop working as expected after reboot or upgrade" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "Junos OS", "version" : { "version_data" : [ { "affected" : "=", "version_name" : "15.1", "version_value" : "15.1R4, 15.1R5, 15.1R6" }, { "affected" : "<", "version_name" : "15.1X8", "version_value" : "15.1X8.3" } ] } } ] }, "vendor_name" : "Juniper Networks" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces extensive | match filters\" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it does not show the applied firewall filter. The correct output should show the applied firewall filter, for example: user@re0> show interfaces extensive | match filters\" CAM destination filters: 0, CAM source filters: 0 Input Filters: FIREWAL_FILTER_NAME- This issue affects firewall filters for every address family. Affected releases are Juniper Networks Junos OS: 15.1R4, 15.1R5, 15.1R6 and SRs based on these MRs. 15.1X8 versions prior to 15.1X8.3." } ] }, "exploit" : [ { "lang" : "eng", "value" : "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "impact" : { "cvss" : { "attackComplexity" : "LOW", "attackVector" : "NETWORK", "availabilityImpact" : "NONE", "baseScore" : 4.7, "baseSeverity" : "MEDIUM", "confidentialityImpact" : "NONE", "integrityImpact" : "LOW", "privilegesRequired" : "NONE", "scope" : "CHANGED", "userInteraction" : "REQUIRED", "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version" : "3.0" } }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "Firewall Bypass" } ] }, { "description" : [ { "lang" : "eng", "value" : "Denial of Service" } ] } ] }, "references" : { "reference_data" : [ { "name" : "https://kb.juniper.net/JSA10859", "refsource" : "CONFIRM", "url" : "https://kb.juniper.net/JSA10859" }, { "name" : "104720", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/104720" }, { "name" : "1041315", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1041315" } ] }, "solution" : [ { "lang" : "eng", "value" : "The following software releases have been updated to resolve this specific issue: 15.1R7, 15.1X8.3 and all subsequent releases.\n" } ], "source" : { "advisory" : "JSA10859", "defect" : [ "1161832" ], "discovery" : "USER" }, "work_around" : [ { "lang" : "eng", "value" : "There are no known workarounds for this issue.\nHowever, once the issue has occurred, it can be restored by performing \"commit full\" (note: \"commit full\" is a potentially disruptive command)." } ] }