CVE-2021-31378Missing Release of Resource after Effective Lifetime in Networks Junos OS

Severity
7.5HIGHNVD
CNA6.8
EPSS
0.3%
top 48.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 19
Latest updateMay 24

Description

In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices where RADIUS servers are configured for managing subscriber access and a subscriber is logged in and then requests to logout, the subscriber may be forced into a "Terminating" state by an attacker who is able to send spoofed messages appearing to originate from trusted RADIUS server(s) destined to the device in response to the subscriber's request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5juniper_networks/junos_os17.317.3R3-S12+14
NVDjuniper/junos15 versions+14

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8pcm-vgvx-r5p5: In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc2022-05-24
CVEList
Junos OS: An attacker sending spoofed RADIUS messages to a Junos OS device configured for broadband services may cause broadband subscribers to remain stuck in a "Terminating" state.2021-10-19

📋Vendor Advisories

1
Juniper
CVE-2021-31378: In broadband environments, including but not limited to Enhanced Subscriber Management, (CHAP, PPP, DHCP, etc.), on Juniper Networks Junos OS devices2021-10-19
CVE-2021-31378 — Networks Junos OS vulnerability | cvebase