6.1
CVSSv2

CVE-2021-0222

Published: 15/01/2021 Updated: 28/01/2021
CVSS v2 Base Score: 6.1 | Impact Score: 6.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 7.4 | Impact Score: 4 | Exploitability Score: 2.8
VMScore: 543
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in Juniper Networks Junos OS allows an malicious user to cause a Denial of Service (DoS) to the device by sending certain crafted protocol packets from an adjacent device with invalid payloads to the device. These crafted packets, which should be discarded, are instead replicated and sent to the RE. Over time, a Denial of Service (DoS) occurs. Continued receipt of these crafted protocol packets will cause an extended Denial of Service (DoS) condition, which may cause wider traffic impact due to protocol flapping. An indication of compromise is to check "monitor interface traffic" on the ingress and egress port packet counts. For each ingress packet, two duplicate packets are seen on egress. This issue can be triggered by IPv4 and IPv6 packets. This issue affects all traffic through the device. This issue affects: Juniper Networks Junos OS: 14.1X53 versions before 14.1X53-D53 on EX4300, QFX3500, QFX5100, EX4600; 15.1 versions before 15.1R7-S6 on EX4300, QFX3500, QFX5100, EX4600; 16.1 versions before 16.1R7-S7 on EX4300, QFX5100, EX4600; 17.1 versions before 17.1R2-S11 on EX4300, QFX5100, EX4600; 17.1 versions before 117.1R3-S2 on EX4300; 17.2 versions before 17.2R1-S9 on EX4300; 17.2 versions before 17.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 17.3 versions before 17.3R2-S5, 17.3R3-S7 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 17.4 versions before 17.4R2-S9, 17.4R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 18.1 versions before 18.1R3-S9 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, EX2300, EX3400; 18.2 versions before 18.2R2-S7 on EX4300; 18.2 versions before 18.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, EX2300, EX3400; 18.3 versions before 18.3R2-S3, on EX4300; 18.3 versions before 18.3R1-S7, 18.3R3-S1 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 18.4 versions before 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.1 versions before 19.1R1-S4, 19.1R2-S1, 19.1R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.2 versions before 19.2R1-S4, 19.2R2 on EX4300; 19.2 versions before 19.2R1-S3, 19.2R2 on QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.3 versions before 19.3R2-S1, 19.3R3 on EX4300; 19.3 versions before 19.3R1-S1, 19.3R2, 19.3R3 on QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 14.1x53

juniper junos 15.1

juniper junos 16.1

juniper junos 17.1

juniper junos 17.2

juniper junos 18.2

juniper junos 18.3

juniper junos 19.2

juniper junos 19.3

juniper junos 17.3

juniper junos 17.4

juniper junos 18.1

juniper junos 18.4

juniper junos 19.1

Github Repositories

A http cve poc framework

Gluttony Gluttony是一个http cve poc框架,使用它可以快速检测内网cve。 1安装 go get githubcom/elon996/gluttony 2用法 检测19216811的thinkphp漏洞 p参数可以是文件或者文件夹 gluttony scan -u 19216811 -p cve-2018-10225yaml gluttony scan -u 19216811 -p cve