CVE-2026-0203 (CNNVD-202601-2545)
中文标题:
Juniper Networks Junos OS 安全漏洞
英文标题:
Junos OS: Receipt of a specifically malformed ICMP packet causes an FPC restart
漏洞描述
中文描述:
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Juniper Networks Junos OS 21.2R3-S9之前版本、21.4版本至21.4R3-S10之前版本、22.2版本至22.2R3-S7之前版本、22.3版本至22.3R3-S4之前版本、22.4版本至22.4R3-S5之前版本、23.2版本至23.2R2-S3之前版本、23.4版本至23.4R2-S3之前版本、24.2版本至24.2R1-S2之前版本和24.2R2版本存在安全漏洞,该漏洞源于数据包处理过程中对异常情况处理不当,可能导致未经验证的相邻网络攻击者通过特制畸形ICMP数据包造成拒绝服务。
英文描述:
An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS allows an unauthenticated, network-adjacent attacker sending a specifically malformed ICMP packet to cause an FPC to crash and restart, resulting in a Denial of Service (DoS). When an ICMP packet is received with a specifically malformed IP header value, the FPC receiving the packet crashes and restarts. Due to the specific type of malformed packet, adjacent upstream routers would not forward the packet, limiting the attack surface to adjacent networks. This issue only affects ICMPv4. ICMPv6 is not vulnerable to this issue. This issue affects Junos OS: * all versions before 21.2R3-S9, * from 21.4 before 21.4R3-S10, * from 22.2 before 22.2R3-S7, * from 22.3 before 22.3R3-S4, * from 22.4 before 22.4R3-S5, * from 23.2 before 23.2R2-S3, * from 23.4 before 23.4R2-S3, * from 24.2 before 24.2R1-S2, 24.2R2.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Juniper Networks | Junos OS | - | < 21.2R3-S9 | - |
cpe:2.3:a:juniper_networks:junos_os:*:*:*:*:*:*:*:*
|
| juniper | junos | * | - | - |
cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
|
| juniper | junos | 21.2 | - | - |
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
|
| juniper | junos | 21.4 | - | - |
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*
|
| juniper | junos | 22.2 | - | - |
cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*
|
| juniper | junos | 22.3 | - | - |
cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*
|
| juniper | junos | 22.4 | - | - |
cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*
|
| juniper | junos | 23.2 | - | - |
cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*
|
| juniper | junos | 23.4 | - | - |
cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:*
|
| juniper | junos | 24.2 | - | - |
cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.0 (cna)
HIGHCVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M/U:Amber
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-0203 |
2026-01-16 02:21:12 | 2026-01-16 02:44:22 |
| NVD | nvd_CVE-2026-0203 |
2026-01-16 02:47:34 | 2026-01-16 02:48:08 |
| CNNVD | cnnvd_CNNVD-202601-2545 |
2026-01-19 09:28:44 | 2026-01-19 09:29:39 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 10
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202601-2545
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 8 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']