CVE-2021-0209
Summary
| CVE | CVE-2021-0209 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-01-15 18:15:00 UTC |
| Updated | 2021-10-25 15:20:00 UTC |
| Description | In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS. |
Risk And Classification
Problem Types: CWE-824
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Juniper | Junos Evolved | 19.4 | r1 | All | All |
| Operating System | Juniper | Junos Evolved | 19.4 | r2 | All | All |
| Operating System | Juniper | Junos Evolved | 19.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos Evolved | 20.1 | - | All | All |
| Operating System | Juniper | Junos Evolved | 20.1 | r1 | All | All |
| Operating System | Juniper | Junos Evolved | 20.1 | r1-s1 | All | All |
| Operating System | Juniper | Junos Evolved | 19.4 | r1 | All | All |
| Operating System | Juniper | Junos Evolved | 19.4 | r2 | All | All |
| Operating System | Juniper | Junos Evolved | 19.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos Evolved | 20.1 | - | All | All |
| Operating System | Juniper | Junos Evolved | 20.1 | r1 | All | All |
| Operating System | Juniper | Junos Evolved | 20.1 | r1-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 19.4 | r1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 19.4 | r2 | All | All |
| Operating System | Juniper | Junos Os Evolved | 19.4 | r2-s1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 20.1 | - | All | All |
| Operating System | Juniper | Junos Os Evolved | 20.1 | r1 | All | All |
| Operating System | Juniper | Junos Os Evolved | 20.1 | r1-s1 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 2021-01 Security Bulletin: Junos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD to core when using REGEX. (CVE-2021-0209) - Juniper Networks | CONFIRM | kb.juniper.net | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.