9.8
CVSSv3

CVE-2021-0276

Published: 15/07/2021 Updated: 05/08/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks SBR Carrier: 8.4.1 versions before 8.4.1R19; 8.5.0 versions before 8.5.0R10; 8.6.0 versions before 8.6.0R4.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper steel-belted radius carrier 8.4.1

juniper steel-belted radius carrier 8.5.0

juniper steel-belted radius carrier 8.6.0