CVE-2021-0250Networks Junos OS vulnerability

6 documents5 sources
Severity
7.5HIGHNVD
EPSS
0.4%
top 39.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateMay 24

Description

In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific crafted BGP update message causing the RPD service to core, creating a Denial of Service (DoS) Condition. Continued receipt and processing of this update message will create a sustained Denial of Service (DoS) condition. This issue affects IPv4 and IPv6

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved19.2-EVO19.2R2-EVO
CVEListV5juniper_networks/junos_os17.4R1unspecified+7
NVDjuniper/junos7 versions+6

🔴Vulnerability Details

2
GHSA
GHSA-jfx9-2fg4-366p: In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing P2022-05-24
CVEList
Junos OS and Junos OS Evolved: An attacker sending a specific crafted BGP update message will crash RPD2021-04-22

📋Vendor Advisories

1
Juniper
CVE-2021-0250: In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing P2021-04-22

💬Community

2
Bugzilla
CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error2020-09-22
Bugzilla
CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling2020-09-15
CVE-2021-0250 — Juniper Networks Junos OS vulnerability | cvebase