Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact Low
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00458.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Juniper
Subscribe
|
Junos
Subscribe
Ptx1000
Subscribe
Ptx1000-72q
Subscribe
Ptx10000
Subscribe
Ptx10001
Subscribe
Ptx10001-36mr
Subscribe
Ptx100016
Subscribe
Ptx10002
Subscribe
Ptx10002-60c
Subscribe
Ptx10003
Subscribe
Ptx10003 160c
Subscribe
Ptx10003 80c
Subscribe
Ptx10003 81cd
Subscribe
Ptx10004
Subscribe
Ptx10008
Subscribe
Ptx10016
Subscribe
Ptx3000
Subscribe
Ptx5000
Subscribe
Qfx10000
Subscribe
Qfx10002
Subscribe
Qfx10002-32q
Subscribe
Qfx10002-60c
Subscribe
Qfx10002-72q
Subscribe
Qfx10008
Subscribe
Qfx10016
Subscribe
Qfx10k
Subscribe
Qfx3000-g
Subscribe
Qfx3000-m
Subscribe
Qfx3008-i
Subscribe
Qfx3100
Subscribe
Qfx3500
Subscribe
Qfx3600
Subscribe
Qfx3600-i
Subscribe
Qfx5100
Subscribe
Qfx5100-96s
Subscribe
Qfx5110
Subscribe
Qfx5120
Subscribe
Qfx5130
Subscribe
Qfx5200
Subscribe
Qfx5200-32c
Subscribe
Qfx5200-48y
Subscribe
Qfx5210
Subscribe
Qfx5210-64c
Subscribe
Qfx5220
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-18271 | An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based attacker to cause increased FPC CPU utilization by sending specific IP packets which are being VXLAN encapsulated leading to a partial Denial of Service (DoS). Continued receipted of these specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on QFX Series: All versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S3, 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. Juniper Networks Junos OS on PTX Series: All versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2. |
Solution
The following software releases have been updated to resolve this specific issue for QFX Series: 17.3R3-S11, 17.4R2-S13, 17.4R3-S4, 18.1R3-S12, 18.2R2-S8, 18.2R3-S7, 18.3R3-S4, 18.4R1-S8, 18.4R2-S7, 18.4R3-S7, 19.1R1-S6, 19.1R2-S2, 19.1R3-S4, 19.2R1-S6, 19.2R3-S2, 19.3R3-S1, 19.4R2-S3, 19.4R3-S1, 20.1R2, 20.1R3, 20.2R2, 20.2R3, 20.3R1-S1, 20.3R2, 20.4R1, and all subsequent releases. The following software releases have been updated to resolve this specific issue for PTX Series: 18.4R3-S9, 19.1R3-S6, 19.2R1-S7, 19.2R3-S3, 19.3R2-S6, 19.3R3-S3, 19.4R1-S4, 19.4R3-S5, 20.1R2-S2, 20.1R3, 20.2R3-S1, 20.3R2-S1, 20.3R3, 20.4R2-S1, 20.4R3, 21.1R1-S1, 21.1R2, 21.2R1, and all subsequent releases.
Workaround
There are no viable workarounds for this issue.
| Link | Providers |
|---|---|
| https://kb.juniper.net/JSA11223 |
|
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-09-17T03:44:15.899Z
Reserved: 2021-04-15T00:00:00
Link: CVE-2021-31361
No data.
Status : Modified
Published: 2021-10-19T19:15:09.197
Modified: 2024-11-21T06:05:30.320
Link: CVE-2021-31361
No data.
OpenCVE Enrichment
No data.
EUVD