6.8
CVSSv2

CVE-2021-0236

Published: 22/04/2021 Updated: 27/04/2021
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Summary

Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects only Multiprotocol BGP (MP-BGP) VPNv6 FlowSpec deployments. This issue affects: Juniper Networks Junos OS: 18.4 versions before 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions before 19.1R2-S2, 19.1R3-S4; 19.2 versions before 19.2R1-S6, 19.2R3-S2; 19.3 versions before 19.3R3-S2; 19.4 versions before 19.4R2-S4, 19.4R3-S1; 20.1 versions before 20.1R2, 20.1R3; 20.2 versions before 20.2R2, 20.2R3; 20.3 versions before 20.3R1-S1, 20.3R2. Juniper Networks Junos OS Evolved: All versions after 18.4R1-EVO before 20.3R2-EVO. This issue does not affect: Juniper Networks Junos OS versions before 18.4R1. Juniper Networks Junos OS Evolved versions before 18.4R1-EVO.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product