CVE-2021-0264Improper Check or Handling of Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
CNA5.9
EPSS
0.2%
top 52.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 22
Latest updateMay 24

Description

A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and restart, creating a Denial of Service (DoS). Continued receipt and processing of packets matching the firewall filter can create a sustained Denial of Service (DoS) condition. When traffic hits the firewall filter, configured on lo0 or any physical

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.4R2-EVO
CVEListV5juniper_networks/junos_os19.319.3R3-S2+5
NVDjuniper/junos_os_evolved8 versions+7
NVDjuniper/junos6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-x88h-4vmv-82q6: A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC12022-05-24
CVEList
Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11, PTX10003, PTX10008: Line card may crash and restart when traffic is hitting a firewall filter having a term with syslog action configured2021-04-22

📋Vendor Advisories

1
Juniper
CVE-2021-0264: A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC12021-04-22
CVE-2021-0264 — Juniper Networks Junos OS vulnerability | cvebase