445
VMScore

CVE-2021-0261

Published: 22/04/2021 Updated: 04/05/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated malicious user to cause an extended Denial of Service (DoS) for these services by sending a high number of specific requests. This issue affects: Juniper Networks Junos OS 12.3 versions before 12.3R12-S17 on EX Series; 12.3X48 versions before 12.3X48-D105 on SRX Series; 15.1 versions before 15.1R7-S8; 15.1X49 versions before 15.1X49-D230 on SRX Series; 16.1 versions before 16.1R7-S8; 17.4 versions before 17.4R2-S12, 17.4R3-S3; 18.1 versions before 18.1R3-S11; 18.2 versions before 18.2R3-S6; 18.3 versions before 18.3R2-S4, 18.3R3-S3; 18.4 versions before 18.4R2-S5, 18.4R3-S4; 19.1 versions before 19.1R2-S2, 19.1R3-S2; 19.2 versions before 19.2R1-S5, 19.2R3; 19.3 versions before 19.3R2-S4, 19.3R3; 19.4 versions before 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions before 20.1R1-S3, 20.1R2; 20.2 versions before 20.2R1-S1, 20.2R2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 12.3

juniper junos 12.3x48

juniper junos 15.1x49