CVE-2021-31366Unchecked Return Value in Networks Junos OS

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 54.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 24

Description

An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Junos OS on MX Series configured for subscriber management / BBE allows an adjacent attacker to cause a crash by sending a specific username. This impacts authentication, authorization, and accounting (AAA) services on the MX devices and leads to a Denial of Service (DoS) condition. Continued receipted of these PPP login request will create a sustained Denial of Service (DoS) condition. This issue af

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os15.115.1R7-S9+15
NVDjuniper/junos16 versions+15

Patches

🔴Vulnerability Details

2
GHSA
GHSA-88jm-v6gw-45j8: An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Junos OS on MX Series configured for subscriber manag2022-05-24
CVEList
Junos OS: MX Series: In subscriber management / BBE configuration authd can crash if a subscriber with a specific username tries to login leading to a DoS2021-10-19

📋Vendor Advisories

1
Juniper
CVE-2021-31366: An Unchecked Return Value vulnerability in the authd (authentication daemon) of Juniper Networks Junos OS on MX Series configured for subscriber manag2021-10-19
CVE-2021-31366 — Unchecked Return Value | cvebase