Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact None
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00389.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Juniper
Subscribe
|
Ex2200
Subscribe
Ex2200-c
Subscribe
Ex2200-vc
Subscribe
Ex2300
Subscribe
Ex2300-c
Subscribe
Ex2300m
Subscribe
Ex3200
Subscribe
Ex3300
Subscribe
Ex3300-vc
Subscribe
Ex3400
Subscribe
Ex4200
Subscribe
Ex4200-vc
Subscribe
Ex4300
Subscribe
Ex4300-24p
Subscribe
Ex4300-24p-s
Subscribe
Ex4300-24t
Subscribe
Ex4300-24t-s
Subscribe
Ex4300-32f
Subscribe
Ex4300-32f-dc
Subscribe
Ex4300-32f-s
Subscribe
Ex4300-48mp
Subscribe
Ex4300-48mp-s
Subscribe
Ex4300-48p
Subscribe
Ex4300-48p-s
Subscribe
Ex4300-48t
Subscribe
Ex4300-48t-afi
Subscribe
Ex4300-48t-dc
Subscribe
Ex4300-48t-dc-afi
Subscribe
Ex4300-48t-s
Subscribe
Ex4300-48tafi
Subscribe
Ex4300-48tdc
Subscribe
Ex4300-48tdc-afi
Subscribe
Ex4300-mp
Subscribe
Ex4300-vc
Subscribe
Ex4300m
Subscribe
Ex4400
Subscribe
Ex4500
Subscribe
Ex4500-vc
Subscribe
Ex4550
Subscribe
Ex4550-vc
Subscribe
Ex4550\/vc
Subscribe
Ex4600
Subscribe
Ex4600-vc
Subscribe
Ex4650
Subscribe
Ex6200
Subscribe
Ex6210
Subscribe
Ex8200
Subscribe
Ex8200-vc
Subscribe
Ex8208
Subscribe
Ex8216
Subscribe
Ex9200
Subscribe
Ex9204
Subscribe
Ex9208
Subscribe
Ex9214
Subscribe
Ex9250
Subscribe
Ex9251
Subscribe
Ex9253
Subscribe
Ex Rps
Subscribe
Junos
Subscribe
Junos Os Evolved
Subscribe
Srx100
Subscribe
Srx110
Subscribe
Srx1400
Subscribe
Srx1500
Subscribe
Srx210
Subscribe
Srx220
Subscribe
Srx240
Subscribe
Srx240h2
Subscribe
Srx300
Subscribe
Srx320
Subscribe
Srx340
Subscribe
Srx3400
Subscribe
Srx345
Subscribe
Srx3600
Subscribe
Srx380
Subscribe
Srx4000
Subscribe
Srx4100
Subscribe
Srx4200
Subscribe
Srx4600
Subscribe
Srx5000
Subscribe
Srx5400
Subscribe
Srx550
Subscribe
Srx550 Hm
Subscribe
Srx550m
Subscribe
Srx5600
Subscribe
Srx5800
Subscribe
Srx650
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2830 | An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Denial of Service (DoS) condition. Continued receipt of these update messages will cause a sustained Denial of Service condition. This issue affects Juniper Networks: Junos OS: All versions prior to 17.3R3-S10 with the exceptions of 15.1X49-D240 on SRX Series and 15.1R7-S8 on EX Series; 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R2-S12, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S6; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S3; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1; 19.4 versions prior to 19.4R1-S3, 19.4R2-S3, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R1-S3 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2. Junos OS Evolved: All versions prior to 20.3R1-S1-EVO, 20.3R2-EVO. |
Solution
The following software releases have been updated to resolve this specific issue: Junos OS: 15.1R7-S8, 15.1X49-D240, 17.3R3-S10, 17.4R2-S12, 17.4R3-S4, 18.1R3-S12, 18.2R2-S8, 18.2R3-S6, 18.3R3-S4, 18.4R1-S8, 18.4R2-S6, 18.4R3-S6, 19.1R2-S2, 19.1R3-S3, 19.2R3-S1, 19.3R2-S5, 19.3R3-S1, 19.4R1-S3, 19.4R2-S3, 19.4R3, 20.1R2, 20.2R1-S3, 20.2R2, 20.3R1-S1, 20.3R2, 20.4R1, and all subsequent releases. Junos OS Evolved: 20.3R1-S1-EVO, 20.3R2-EVO, 20.4R1-EVO, and all subsequent releases.
Workaround
There are no viable workarounds for this issue.
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11101 |
|
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-16T20:52:46.854Z
Reserved: 2020-10-27T00:00:00
Link: CVE-2021-0211
No data.
Status : Modified
Published: 2021-01-15T18:15:15.167
Modified: 2024-11-21T05:42:12.897
Link: CVE-2021-0211
No data.
OpenCVE Enrichment
No data.
EUVD