CVE-2021-31351Improper Check for Unusual or Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 39.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 24

Description

An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects specific versions of Juniper Networks Junos OS on MX Series: 17.3R3-S11; 17.4R2-S13; 17.4R3 prior to 17.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os17.4R2-S1317.4*+18
NVDjuniper/junos15 versions+14

🔴Vulnerability Details

2
GHSA
GHSA-j3ff-rvrx-2j9x: An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malic2022-05-24
CVEList
Junos OS: MX Series: Receipt of specific packet on MS-MPC/MS-MIC causes line card reset2021-10-19

📋Vendor Advisories

1
Juniper
CVE-2021-31351: An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malic2021-10-19
CVE-2021-31351 — Networks Junos OS vulnerability | cvebase