CVE-2021-0261Out-of-bounds Read in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 36.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateApr 11

Description

A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated attacker to cause an extended Denial of Service (DoS) for these services by sending a high number of specific requests. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S17 on EX Series; 12.3X48 versions prior to 12.3X48-D105 on SRX Series; 15.1 versions prior to 15.1R7-S8;

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os12.312.3R12-S17+15
NVDjuniper/junos17 versions+16

🔴Vulnerability Details

2
GHSA
GHSA-3pxh-pm6h-2cp2: A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirec2022-05-24
CVEList
Junos OS: Denial of Service vulnerability in J-Web and web based (HTTP/HTTPS) services caused by a high number of specific requests2021-04-22

📋Vendor Advisories

1
Juniper
CVE-2021-0261: A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirec2021-04-22

💬Community

1
Bugzilla
CVE-2021-47190 kernel: perf bpf: Avoid memory leak from perf_env__insert_btf()2024-04-11
CVE-2021-0261 — Out-of-bounds Read in Networks Junos OS | cvebase