CVE-2021-0283Classic Buffer Overflow in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 36.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 15
Latest updateMay 24

Description

A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition. The device will abnormally shut down as a result of these sent packets. A potential indicator of compromise will be the following message in the log files: "eventd[13955]: SYSTEM

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os12.312.3R12-S19+21
NVDjuniper/junos21 versions+20

🔴Vulnerability Details

2
GHSA
GHSA-mjmr-9wj5-pjjf: A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the devic2022-05-24
CVEList
Junos OS: Upon receipt of specific sequences of genuine packets destined to the device the kernel will crash and restart (vmcore)2021-07-15

📋Vendor Advisories

1
Juniper
CVE-2021-0283: A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the devic2021-07-15
CVE-2021-0283 — Classic Buffer Overflow | cvebase