CVE-2021-0226Improper Initialization in Networks Junos OS Evolved

Severity
7.5HIGHNVD
CNA7.1
EPSS
0.5%
top 32.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateMay 24

Description

On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue does not affect IPv4 BGP sessions. This issue affects IBGP or EBGP peer sessions with IPv6. This issue affects: Juniper Networks Junos OS Evolved: 19.4 versions prior to 19.4R2-S3-EVO; 20.1 versions p

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved19.4-EVO19.4R2-S3-EVO+3
NVDjuniper/junos_os_evolved20.1, 20.2, 20.3+2

🔴Vulnerability Details

2
GHSA
GHSA-7jmp-9phw-35g8: On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Den2022-05-24
CVEList
Junos OS Evolved: The IPv6 BGP session will flap due to receipt of a specific IPv6 packet2021-04-22

📋Vendor Advisories

1
Juniper
CVE-2021-0226: On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Den2021-04-22
CVE-2021-0226 — Improper Initialization | cvebase