Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-0202— Junos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and Bridging (IRB) interface is mapped to a VPLS instance or a Bridge-Domain

CVSS 7.5 · High EPSS 0.39% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-0202

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and Bridging (IRB) interface is mapped to a VPLS instance or a Bridge-Domain
Source: NVD (National Vulnerability Database)
Vulnerability Description
On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may cause memory leak in the MPC which can cause an out of memory and MPC restarts. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions starting from 18.4R3-S1 and later versions prior to 18.4R3-S6; 19.2 versions starting from 19.2R2 and later versions prior to 19.2R3-S1; 19.4 versions starting from 19.4R2 and later versions prior to 19.4R2-S3, 19.4R3; 20.2 versions starting from 20.2R1 and later versions prior to 20.2R1-S3, 20.2R2. This issue does not affect Juniper Networks Junos OS: 18.1, 19.1, 19.3, 20.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks MX Series and EX9200 Series 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks MX Series and EX9200 Series 存在资源管理错误漏洞,攻击者可利用该漏洞通过Junos OS MX EX的MPC IRB创建内存泄漏,以触发拒绝服务。以下产品及版本受到影响:Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions star
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 17.3R3-S8 -

II. Public POCs for CVE-2021-0202

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-0202

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2021-01-15 · 19 CVEs total

CVE-2021-021110.0 CRITICALJunos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network tra
CVE-2021-02088.8 HIGHJunos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router
CVE-2021-02038.6 HIGHJunos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trun
CVE-2021-02047.8 HIGHJunos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02237.8 HIGHJunos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02187.8 HIGHJunos OS: Command injection vulnerability in license-check daemon
CVE-2021-02077.5 HIGHNFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Se
CVE-2021-02067.5 HIGHJunos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL P
CVE-2021-02177.4 HIGHJunos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets
CVE-2021-02227.4 HIGHJunos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagatin
CVE-2021-02106.8 MEDIUMJunos OS: Privilege escalation in J-Web due to arbitrary command and code execution via in
CVE-2021-02206.8 MEDIUMJunos Space: Shared secrets stored in recoverable format and directly exposed through the
CVE-2021-02196.7 MEDIUMJunos OS: Command injection vulnerability in 'request system software' CLI command
CVE-2021-02096.5 MEDIUMJunos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD
CVE-2021-02156.5 MEDIUMJunos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwa
CVE-2021-02216.5 MEDIUMJunos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP mul
CVE-2021-02055.8 MEDIUMJunos OS: MX Series: Dynamic filter fails to match IPv6 prefix
CVE-2021-02125.0 MEDIUMContrail Networking: Administrator credentials are exposed in a plaintext file

IV. Related Vulnerabilities

V. Comments for CVE-2021-0202

No comments yet


Leave a comment