CVE-2021-0226

On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue does not affect IPv4 BGP sessions. This issue affects IBGP or EBGP peer sessions with IPv6. This issue affects: Juniper Networks Junos OS Evolved: 19.4 versions prior to 19.4R2-S3-EVO; 20.1 versions prior to 20.1R2-S3-EVO; 20.2 versions prior to 20.2R2-S1-EVO; 20.3 versions prior to 20.3R2-EVO. This issue does not affect Juniper Networks Junos OS releases.
References
Link Resource
https://kb.juniper.net/JSA11121 Vendor Advisory
https://kb.juniper.net/JSA11121 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.1:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:20.3:r1-s1:*:*:*:*:*:*

History

21 Nov 2024, 05:42

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 7.1
References () https://kb.juniper.net/JSA11121 - Vendor Advisory () https://kb.juniper.net/JSA11121 - Vendor Advisory

Information

Published : 2021-04-22 20:15

Updated : 2024-11-21 05:42


NVD link : CVE-2021-0226

Mitre link : CVE-2021-0226

CVE.ORG link : CVE-2021-0226


JSON object : View

Products Affected

juniper

  • junos_os_evolved
CWE
CWE-665

Improper Initialization