CVE-2021-0281Improper Check for Unusual or Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
CNA5.9
EPSS
0.3%
top 48.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 15
Latest updateMay 24

Description

On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packet from the RPKI cache server may cause routing process daemon (RPD) to crash and restart, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS 17.3 versions prior to 17.3R3-S12; 17.4 versions prior to 17.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5juniper_networks/junos_os_evolvedAll20.4R2-S2-EVO
CVEListV5juniper_networks/junos_os17.317.3R3-S12+13
NVDjuniper/junos14 versions+13

🔴Vulnerability Details

2
GHSA
GHSA-c2jm-r7hm-x34g: On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packe2022-05-24
CVEList
Junos OS and Junos OS Evolved: Specific packets can trigger rpd crash when BGP Origin Validation is configured with RPKI2021-07-15

📋Vendor Advisories

1
Juniper
CVE-2021-0281: On Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) receipt of a specific packe2021-07-15
CVE-2021-0281 — Juniper Networks Junos OS vulnerability | cvebase