CVE-2018-0026
Summary
| CVE | CVE-2018-0026 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-11 18:29:00 UTC |
| Updated | 2019-10-09 23:31:00 UTC |
| Description | After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it does not show the applied firewall filter. The correct output should show the applied firewall filter, for example: user@re0> show interfaces <interface_name> extensive | match filters" CAM destination filters: 0, CAM source filters: 0 Input Filters: FIREWAL_FILTER_NAME-<interface_name> This issue affects firewall filters for every address family. Affected releases are Juniper Networks Junos OS: 15.1R4, 15.1R5, 15.1R6 and SRs based on these MRs. 15.1X8 versions prior to 15.1X8.3. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Juniper | Junos | 15.1 | r4 | All | All |
| Operating System | Juniper | Junos | 15.1 | r5 | All | All |
| Operating System | Juniper | Junos | 15.1 | r6 | All | All |
| Operating System | Juniper | Junos | 15.1x8 | All | All | All |
| Operating System | Juniper | Junos | 15.1 | r4 | All | All |
| Operating System | Juniper | Junos | 15.1 | r5 | All | All |
| Operating System | Juniper | Junos | 15.1 | r6 | All | All |
| Operating System | Juniper | Junos | 15.1x8 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Juniper Junos CVE-2018-0026 Security Bypass Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| 2018-07 Security Bulletin: Junos OS: Stateless IP firewall filter rules stop working as expected after reboot or upgrade (CVE-2018-0026) - Juniper Networks | CONFIRM | kb.juniper.net | Vendor Advisory |
| Juniper Junos Reboot Issue Lets Remote Users Bypass the Firewall - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.