目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2021-0222— Juniper Networks Junos OS 配置错误漏洞

CVSS 7.4 · High EPSS 0.05% · P16
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2021-0222の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Junos OS: Upon receipt of certain protocol packets with invalid payloads a self-propagating Denial of Service may occur.
ソース: NVD (National Vulnerability Database)
脆弱性説明
A vulnerability in Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending certain crafted protocol packets from an adjacent device with invalid payloads to the device. These crafted packets, which should be discarded, are instead replicated and sent to the RE. Over time, a Denial of Service (DoS) occurs. Continued receipt of these crafted protocol packets will cause an extended Denial of Service (DoS) condition, which may cause wider traffic impact due to protocol flapping. An indication of compromise is to check "monitor interface traffic" on the ingress and egress port packet counts. For each ingress packet, two duplicate packets are seen on egress. This issue can be triggered by IPv4 and IPv6 packets. This issue affects all traffic through the device. This issue affects: Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D53 on EX4300, QFX3500, QFX5100, EX4600; 15.1 versions prior to 15.1R7-S6 on EX4300, QFX3500, QFX5100, EX4600; 16.1 versions prior to 16.1R7-S7 on EX4300, QFX5100, EX4600; 17.1 versions prior to 17.1R2-S11 on EX4300, QFX5100, EX4600; 17.1 versions prior to 117.1R3-S2 on EX4300; 17.2 versions prior to 17.2R1-S9 on EX4300; 17.2 versions prior to 17.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 17.3 versions prior to 17.3R2-S5, 17.3R3-S7 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 17.4 versions prior to 17.4R2-S9, 17.4R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 18.1 versions prior to 18.1R3-S9 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, EX2300, EX3400; 18.2 versions prior to 18.2R2-S7 on EX4300; 18.2 versions prior to 18.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, EX2300, EX3400; 18.3 versions prior to 18.3R2-S3, on EX4300; 18.3 versions prior to 18.3R1-S7, 18.3R3-S1 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.2 versions prior to 19.2R1-S4, 19.2R2 on EX4300; 19.2 versions prior to 19.2R1-S3, 19.2R2 on QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.3 versions prior to 19.3R2-S1, 19.3R3 on EX4300; 19.3 versions prior to 19.3R1-S1, 19.3R2, 19.3R3 on QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Juniper Networks Junos OS 配置错误漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Juniper Networks Junos OS是美国瞻博网络(Juniper Networks)公司的一套专用于该公司的硬件设备的网络操作系统。该操作系统提供了安全编程接口和Junos SDK。 Junos OS 存在配置错误漏洞,攻击者可利用该漏洞通过协议数据包触发一个致命错误,以触发拒绝服务。以下产品及版本受到影响:Juniper Networks Junos OS: 14.1X53 versions prior to 14.1X53-D53 on EX4300, QFX3500, QFX5100
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Juniper NetworksJunos OS 14.1X53 ~ 14.1X53-D53 -
Juniper NetworksJunos OS 16.1 ~ 16.1R7-S7 -
Juniper NetworksJunos OS 17.1 ~ 17.1R3-S2 -
Juniper NetworksJunos OS 17.2 ~ 17.2R3-S3 -
Juniper NetworksJunos OS 18.1 ~ 18.1R3-S9 -
Juniper NetworksJunos OS 18.3 ~ 18.3R1-S7, 18.3R3-S1 -
Juniper NetworksJunos OS 19.2 ~ 19.2R1-S4, 19.2R2 -

II. CVE-2021-0222の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2021-0222のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2021-01-15 · 19 CVEs total

CVE-2021-021110.0 CRITICALJunos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network tra
CVE-2021-02088.8 HIGHJunos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router
CVE-2021-02038.6 HIGHJunos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trun
CVE-2021-02047.8 HIGHJunos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02187.8 HIGHJunos OS: Command injection vulnerability in license-check daemon
CVE-2021-02237.8 HIGHJunos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries
CVE-2021-02067.5 HIGHJunos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL P
CVE-2021-02077.5 HIGHNFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Se
CVE-2021-02027.5 HIGHJunos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and
CVE-2021-02177.4 HIGHJunos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets
CVE-2021-02106.8 MEDIUMJunos OS: Privilege escalation in J-Web due to arbitrary command and code execution via in
CVE-2021-02206.8 MEDIUMJunos Space: Shared secrets stored in recoverable format and directly exposed through the
CVE-2021-02196.7 MEDIUMJunos OS: Command injection vulnerability in 'request system software' CLI command
CVE-2021-02096.5 MEDIUMJunos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD
CVE-2021-02156.5 MEDIUMJunos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwa
CVE-2021-02216.5 MEDIUMJunos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP mul
CVE-2021-02055.8 MEDIUMJunos OS: MX Series: Dynamic filter fails to match IPv6 prefix
CVE-2021-02125.0 MEDIUMContrail Networking: Administrator credentials are exposed in a plaintext file

IV. 関連脆弱性

V. CVE-2021-0222へのコメント

まだコメントはありません


コメントを残す