#VU54991 Input validation error in Juniper Junos OS


Published: 2021-07-19

Vulnerability identifier: #VU54991

Vulnerability risk: High

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-0282

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Juniper Junos OS
Operating systems & Components / Operating system

Vendor: Juniper Networks, Inc.

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing a specific BGP UPDATE on Juniper Networks Junos OS devices with Multipath or add-path feature enabled. A remote attacker can send specific BGP UPDATE message and crash the routing process daemon (RPD).

This BGP UPDATE message can propagate to other BGP peers with vulnerable Junos versions on which Multipath or add-path feature is enabled, and cause RPD to crash and restart. This issue affects both IBGP and EBGP deployments in IPv4 or IPv6 network.


Mitigation
Install updates from vendor's website.

Vulnerable software versions

Juniper Junos OS: 12.3 - 12.3R12-S17, 17.4 - 17.4R3-S3, 17.4R2-S9, 18.2 - 18.2R3-S6, 17.3 - 17.3R3-S10, 15.1 - 15.1R7-S8, 15.1F - 15.1F7-S2, 18.1 - 18.1R3-S11, 18.3 - 18.3R3-S3, 18.3R2-S3, 18.3R3-S1, 19.1 - 19.1R3-S2, 19.1R1-S4, 18.4 - 18.4R3-S5, 18.4R1-S5, 18.4R2-S3, 19.2


External links
http://kb.juniper.net/JSA11186


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability