Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-0211— Junos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network traffic may be disrupted.

CVSS 10.0 · Critical EPSS 0.39% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-0211

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network traffic may be disrupted.
Source: NVD (National Vulnerability Database)
Vulnerability Description
An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS和Junos OS Evolved都是美国瞻博网络(Juniper Networks)公司的产品。Juniper Networks Junos OS是一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。Junos OS Evolved是Junos OS 的升级版系统。 Juniper Networks Junos OS Evolved 存在安全漏洞,攻击者可利用该漏洞使应用拒绝服务。以下产品及版本受到影响:Junos
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS 15.1 ~ 15.1R7-S8 -
Juniper NetworksJunos OS 17.3 ~ 17.3R3-S10 -
Juniper NetworksJunos OS 15.1X49 ~ 15.1X490-D240 -
Juniper NetworksJunos OS Evolved unspecified ~ 20.3R1-S1-EVO, 20.3R2-EVO -

II. Public POCs for CVE-2021-0211

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-0211

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2021-01-15 · 19 CVEs total

CVE-2021-02088.8 HIGHJunos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router
CVE-2021-02038.6 HIGHJunos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trun
CVE-2021-02237.8 HIGHJunos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02187.8 HIGHJunos OS: Command injection vulnerability in license-check daemon
CVE-2021-02047.8 HIGHJunos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02067.5 HIGHJunos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL P
CVE-2021-02077.5 HIGHNFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Se
CVE-2021-02027.5 HIGHJunos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and
CVE-2021-02177.4 HIGHJunos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets
CVE-2021-02227.4 HIGHJunos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagatin
CVE-2021-02106.8 MEDIUMJunos OS: Privilege escalation in J-Web due to arbitrary command and code execution via in
CVE-2021-02206.8 MEDIUMJunos Space: Shared secrets stored in recoverable format and directly exposed through the
CVE-2021-02196.7 MEDIUMJunos OS: Command injection vulnerability in 'request system software' CLI command
CVE-2021-02096.5 MEDIUMJunos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD
CVE-2021-02156.5 MEDIUMJunos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwa
CVE-2021-02216.5 MEDIUMJunos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP mul
CVE-2021-02055.8 MEDIUMJunos OS: MX Series: Dynamic filter fails to match IPv6 prefix
CVE-2021-02125.0 MEDIUMContrail Networking: Administrator credentials are exposed in a plaintext file

IV. Related Vulnerabilities

V. Comments for CVE-2021-0211

No comments yet


Leave a comment