CVE-2021-0202

Summary

CVECVE-2021-0202
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-01-15 18:15:00 UTC
Updated2022-08-05 18:30:00 UTC
DescriptionOn Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may cause memory leak in the MPC which can cause an out of memory and MPC restarts. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines). Please refer to https://kb.juniper.net/KB25385 for the list of Trio-based PFEs. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3R3-S8; 17.4R3-S2; 18.2R3-S4, 18.2R3-S5; 18.3R3-S2, 18.3R3-S3; 18.4 versions starting from 18.4R3-S1 and later versions prior to 18.4R3-S6; 19.2 versions starting from 19.2R2 and later versions prior to 19.2R3-S1; 19.4 versions starting from 19.4R2 and later versions prior to 19.4R2-S3, 19.4R3; 20.2 versions starting from 20.2R1 and later versions prior to 20.2R1-S3, 20.2R2. This issue does not affect Juniper Networks Junos OS: 18.1, 19.1, 19.3, 20.1.

Risk And Classification

Problem Types: CWE-401

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Juniper Ex9200 - All All All
Hardware Juniper Ex9200 - All All All
Hardware Juniper Ex9200 - All All All
Operating System Juniper Junos 17.3 r3-s8 All All
Operating System Juniper Junos 17.4 r3-s2 All All
Operating System Juniper Junos 18.2 r3-s4 All All
Operating System Juniper Junos 18.2 r3-s5 All All
Operating System Juniper Junos 18.3 r3-s2 All All
Operating System Juniper Junos 18.3 r3-s3 All All
Operating System Juniper Junos 18.4 r3-s1 All All
Operating System Juniper Junos 18.4 r3-s2 All All
Operating System Juniper Junos 18.4 r3-s3 All All
Operating System Juniper Junos 18.4 r3-s4 All All
Operating System Juniper Junos 18.4 r3-s5 All All
Operating System Juniper Junos 19.2 r2 All All
Operating System Juniper Junos 19.2 r3 All All
Operating System Juniper Junos 19.4 r2 All All
Operating System Juniper Junos 19.4 r2-s1 All All
Operating System Juniper Junos 19.4 r2-s2 All All
Operating System Juniper Junos 20.2 r1 All All
Operating System Juniper Junos 20.2 r1-s1 All All
Operating System Juniper Junos 20.2 r1-s2 All All
Operating System Juniper Junos 17.3 r3-s8 All All
Operating System Juniper Junos 17.4 r3-s2 All All
Operating System Juniper Junos 18.2 r3-s4 All All
Operating System Juniper Junos 18.2 r3-s5 All All
Operating System Juniper Junos 18.3 r3-s2 All All
Operating System Juniper Junos 18.3 r3-s3 All All
Operating System Juniper Junos 18.4 r3-s1 All All
Operating System Juniper Junos 18.4 r3-s2 All All
Operating System Juniper Junos 18.4 r3-s3 All All
Operating System Juniper Junos 18.4 r3-s4 All All
Operating System Juniper Junos 18.4 r3-s5 All All
Operating System Juniper Junos 19.2 r2 All All
Operating System Juniper Junos 19.2 r3 All All
Operating System Juniper Junos 19.4 r2 All All
Operating System Juniper Junos 19.4 r2-s1 All All
Operating System Juniper Junos 19.4 r2-s2 All All
Operating System Juniper Junos 20.2 r1 All All
Operating System Juniper Junos 20.2 r1-s1 All All
Operating System Juniper Junos 20.2 r1-s2 All All
Hardware Juniper Mx10 - All All All
Hardware Juniper Mx10 - All All All
Hardware Juniper Mx10 - All All All
Hardware Juniper Mx10000 - All All All
Hardware Juniper Mx10000 - All All All
Hardware Juniper Mx10000 - All All All
Hardware Juniper Mx10003 - All All All
Hardware Juniper Mx10003 - All All All
Hardware Juniper Mx10003 - All All All
Hardware Juniper Mx104 - All All All
Hardware Juniper Mx104 - All All All
Hardware Juniper Mx104 - All All All
Hardware Juniper Mx150 - All All All
Hardware Juniper Mx150 - All All All
Hardware Juniper Mx150 - All All All
Hardware Juniper Mx2008 - All All All
Hardware Juniper Mx2008 - All All All
Hardware Juniper Mx2008 - All All All
Hardware Juniper Mx2010 - All All All
Hardware Juniper Mx2010 - All All All
Hardware Juniper Mx2010 - All All All
Hardware Juniper Mx2020 - All All All
Hardware Juniper Mx2020 - All All All
Hardware Juniper Mx2020 - All All All
Hardware Juniper Mx204 - All All All
Hardware Juniper Mx204 - All All All
Hardware Juniper Mx204 - All All All
Hardware Juniper Mx240 - All All All
Hardware Juniper Mx240 - All All All
Hardware Juniper Mx240 - All All All
Hardware Juniper Mx40 - All All All
Hardware Juniper Mx40 - All All All
Hardware Juniper Mx40 - All All All
Hardware Juniper Mx480 - All All All
Hardware Juniper Mx480 - All All All
Hardware Juniper Mx480 - All All All
Hardware Juniper Mx5 - All All All
Hardware Juniper Mx5 - All All All
Hardware Juniper Mx5 - All All All
Hardware Juniper Mx80 - All All All
Hardware Juniper Mx80 - All All All
Hardware Juniper Mx80 - All All All
Hardware Juniper Mx960 - All All All
Hardware Juniper Mx960 - All All All
Hardware Juniper Mx960 - All All All

References

ReferenceSourceLinkTags
2021-01 Security Bulletin: Junos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and Bridging (IRB) interface is mapped to a VPLS instance or a Bridge-Domain (CVE-2021-0202) - Juniper Networks CONFIRM kb.juniper.net Vendor Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report