Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-0209— Junos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD to core when using REGEX.

CVSS 6.5 · Medium EPSS 0.08% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-0209

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD to core when using REGEX.
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用未经初始化的指针
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS Evolved 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS和Junos OS Evolved都是美国瞻博网络(Juniper Networks)公司的产品。Juniper Networks Junos OS是一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。Junos OS Evolved是Junos OS 的升级版系统。 Junos OS Evolved 存在缓冲区错误漏洞,攻击者可利用该漏洞使应用拒绝服务。以下产品及版本受到影响:Junos OS Evolved 19
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS Evolved 19.4 ~ 19.4R2-S2-EVO -

II. Public POCs for CVE-2021-0209

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-0209

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2021-01-15 · 19 CVEs total

CVE-2021-021110.0 CRITICALJunos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network tra
CVE-2021-02088.8 HIGHJunos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router
CVE-2021-02038.6 HIGHJunos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trun
CVE-2021-02237.8 HIGHJunos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02187.8 HIGHJunos OS: Command injection vulnerability in license-check daemon
CVE-2021-02047.8 HIGHJunos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02077.5 HIGHNFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Se
CVE-2021-02067.5 HIGHJunos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL P
CVE-2021-02027.5 HIGHJunos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and
CVE-2021-02177.4 HIGHJunos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets
CVE-2021-02227.4 HIGHJunos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagatin
CVE-2021-02106.8 MEDIUMJunos OS: Privilege escalation in J-Web due to arbitrary command and code execution via in
CVE-2021-02206.8 MEDIUMJunos Space: Shared secrets stored in recoverable format and directly exposed through the
CVE-2021-02196.7 MEDIUMJunos OS: Command injection vulnerability in 'request system software' CLI command
CVE-2021-02156.5 MEDIUMJunos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwa
CVE-2021-02216.5 MEDIUMJunos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP mul
CVE-2021-02055.8 MEDIUMJunos OS: MX Series: Dynamic filter fails to match IPv6 prefix
CVE-2021-02125.0 MEDIUMContrail Networking: Administrator credentials are exposed in a plaintext file

IV. Related Vulnerabilities

V. Comments for CVE-2021-0209

No comments yet


Leave a comment