CVE-2021-31378 — Missing Release of Resource after Effective Lifetime in Networks Junos OS
Severity
7.5HIGHNVD
CNA6.8
EPSS
0.3%
top 48.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 19
Latest updateMay 24
Description
In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and then requests to logout, the subscriber may be forced into a "Terminating" state by an attacker who is able to send spoofed messages appearing to originate from trusted RADIUS server(s) destined to the device in response to the subscriber's request.…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-8pcm-vgvx-r5p5: In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc↗2022-05-24
CVEList▶
Junos OS: An attacker sending spoofed RADIUS messages to a Junos OS device configured for broadband services may cause broadband subscribers to remain stuck in a "Terminating" state.↗2021-10-19
📋Vendor Advisories
1Juniper▶
CVE-2021-31378: In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices↗2021-10-19