Vulnerability identifier: #VU81668
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Juniper Junos OS
Operating systems & Components /
Operating system
Vendor: Juniper Networks, Inc.
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources in the Packet Forwarding Engine (PFE). If the device is very busy for example while executing a series of show
commands on the CLI one or more SFPs might not be detected anymore. The
system then changes its state to "unplugged" which is leading to traffic
impact and at least a partial DoS. A local user can cause a high load for the device and perform a denial of service attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Juniper Junos OS: 20.1 - 20.1R3-S3, 19.1 - 19.1R3-S8, 19.1R1-S4, 19.4 - 19.4R2-S6, 19.4R1 - 19.4R1-S4, 21.4R1 - 21.4R1-S2, 20.3 - 20.3R3-S3, 19.3 - 19.3R3-S5, 19.3R1-S1, 19.3R2 - 19.3R2-S7, 20.4 - 20.4R3-S2, 21.1 - 21.1R3, 20.2 - 20.2R3-S3, 19.2 - 19.2R1-S8, 19.2R1-S4, 18.4 - 18.4R3-S10, 18.4R1-S5, 18.4R2-S3, 21.2R1 - 21.2R2-S2, 21.3R1 - 21.3R1-S2
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.