CVE-2021-31353Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.5HIGHNVD
EPSS
0.4%
top 38.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 24

Description

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of Service (DoS). Continued receipt and processing of the BGP update will create a sustained Denial of Service (DoS) condition. This issue affects very specific versions of Juniper Networks Junos OS: 19.3R3-S2; 19.4R3-S3; 20.2 versions 20.2R2-S3 and lat

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolvedunspecified20.4R2-S3-EVO, 20.4R3-EVO+2
CVEListV5juniper_networks/junos_os21.121.1R2+2
NVDjuniper/junos6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-jpg9-x2w5-xfrh: An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific2022-05-24
CVEList
Junos OS and Junos OS Evolved: RPD core upon receipt of specific BGP update2021-10-19

📋Vendor Advisories

1
Juniper
CVE-2021-31353: An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an attacker to inject a specific2021-10-19
CVE-2021-31353 — Networks Junos OS vulnerability | cvebase