445
VMScore

CVE-2021-0229

Published: 22/04/2021 Updated: 27/04/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an malicious user to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (JET) application designed with a listening port uses the Message Queue Telemetry Transport (MQTT) protocol to connect to a mosquitto broker that is running on Junos OS to subscribe for events. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 16.1R1 and later versions before 17.3R3-S11; 17.4 versions before 17.4R2-S13, 17.4R3-S4; 18.1 versions before 18.1R3-S12; 18.2 versions before 18.2R2-S8, 18.2R3-S7; 18.3 versions before 18.3R3-S4; 18.4 versions before 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions before 19.1R3-S5; 19.2 versions before 19.2R1-S6, 19.2R3-S2; 19.3 versions before 19.3R3-S2; 19.4 versions before 19.4R2-S4, 19.4R3-S2; 20.1 versions before 20.1R2-S1, 20.1R3; 20.2 versions before 20.2R2-S2, 20.2R3; 20.3 versions before 20.3R1-S1, 20.3R2. This issue does not affect Juniper Networks Junos OS versions before 16.1R1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product