{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T07:21:42.429","vulnerabilities":[{"cve":{"id":"CVE-2018-0026","sourceIdentifier":"sirt@juniper.net","published":"2018-07-11T18:29:00.293","lastModified":"2024-11-21T03:37:23.333","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"After Junos OS device reboot or upgrade, the stateless firewall filter configuration may not take effect. This issue can be verified by running the command: user@re0> show interfaces <interface_name> extensive | match filters\" CAM destination filters: 0, CAM source filters: 0 Note: when the issue occurs, it does not show the applied firewall filter. The correct output should show the applied firewall filter, for example: user@re0> show interfaces <interface_name> extensive | match filters\" CAM destination filters: 0, CAM source filters: 0 Input Filters: FIREWAL_FILTER_NAME-<interface_name> This issue affects firewall filters for every address family. Affected releases are Juniper Networks Junos OS: 15.1R4, 15.1R5, 15.1R6 and SRs based on these MRs. 15.1X8 versions prior to 15.1X8.3."},{"lang":"es","value":"Tras un reinicio o actualización del dispositivo Junos OS, la configuración del filtro del firewall sin estado podría no surtir efecto. Este problema puede verificarse ejecutando el comando user@re0> show interfaces  extensive | match filters\" CAM destination filters: 0, CAM source filters: 0 Note: cuando el problema ocurre, no muestra el filtro de firewall aplicado. La salida correcta debería mostrar el filtro de firewall aplicado, por ejemplo: user@re0> show interfaces  extensive | match filters\" CAM destination filters: 0, CAM source filters: 0 Input Filters: FIREWAL_FILTER_NAME- Este problema afecta a los filtros de firewall para cada familia de direcciones. Las versiones afectadas son Juniper Networks Junos OS: 15.1R4, 15.1R5, 15.1R6 y SR basados en estos MR. versiones 15.1X8 anteriores a la 15.1X8.3."}],"metrics":{"cvssMetricV30":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*","matchCriteriaId":"4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*","matchCriteriaId":"08FC0245-A4FF-42C0-A236-8569301E351A"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*","matchCriteriaId":"120EA9E3-788B-4CFD-A74F-17111FFD0131"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:15.1x8:*:*:*:*:*:*:*","matchCriteriaId":"A0B4B619-BC7E-46A7-A7D7-FBD226EF2D6C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/104720","source":"sirt@juniper.net","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041315","source":"sirt@juniper.net","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kb.juniper.net/JSA10859","source":"sirt@juniper.net","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/104720","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041315","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kb.juniper.net/JSA10859","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}