5
CVSSv2

CVE-2021-31353

Published: 19/10/2021 Updated: 25/10/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an malicious user to inject a specific BGP update, causing the routing protocol daemon (RPD) to crash and restart, leading to a Denial of Service (DoS). Continued receipt and processing of the BGP update will create a sustained Denial of Service (DoS) condition. This issue affects very specific versions of Juniper Networks Junos OS: 19.3R3-S2; 19.4R3-S3; 20.2 versions 20.2R2-S3 and later, before 20.2R3-S2; 20.3 versions 20.3R2 and later, before 20.3R3; 20.4 versions 20.4R2 and later, before 20.4R3; 21.1 versions before 21.1R2. Juniper Networks Junos OS 20.1 is not affected by this issue. This issue also affects Juniper Networks Junos OS Evolved: All versions before 20.4R2-S3-EVO, 20.4R3-EVO; 21.1-EVO versions before 21.1R2-EVO; 21.2-EVO versions before 21.2R2-EVO.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

juniper junos 19.3

juniper junos 19.4

juniper junos 20.2

juniper junos 20.3

juniper junos 20.4

juniper junos 21.1

juniper junos os evolved

juniper junos os evolved 20.4

juniper junos os evolved 21.1

juniper junos os evolved 21.2