CVE-2021-31375Improper Input Validation in Networks Junos OS

Severity
5.3MEDIUMNVD
CNA7.2
EPSS
0.2%
top 56.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 24

Description

An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI), allows an attacker to send a specific BGP update which may cause RPKI policy-checks to be bypassed. This, in turn, may allow a spoofed advertisement to be accepted or propagated. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S18; 15.1 versions prior to 15.1R7-S9; 17.2 v

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

CVEListV5juniper_networks/junos_os12.312.3R12-S18+11
NVDjuniper/junos12 versions+11

🔴Vulnerability Details

2
GHSA
GHSA-5cv3-4c79-w87h: An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation2022-05-24
CVEList
Junos OS: Receipt of a specific BGP update may cause RPKI policy-checks to be bypassed2021-10-19

📋Vendor Advisories

1
Juniper
CVE-2021-31375: An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation2021-10-19
CVE-2021-31375 — Improper Input Validation | cvebase