ID

VAR-202104-0580


CVE

CVE-2021-0239


TITLE

Juniper Networks Junos OS Code problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202104-1041

DESCRIPTION

In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations within the packet forwarding engine (PFE) to crash and restart, leading to a Denial of Service (DoS) condition. By continuously sending this specific stream of genuine Layer 2 frames, an attacker can repeatedly crash the PFE, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R1-EVO. This issue does not affect Junos OS versions

Trust: 1.08

sources: NVD: CVE-2021-0239 // VULHUB: VHN-372141 // VULMON: CVE-2021-0239

AFFECTED PRODUCTS

vendor:junipermodel:junos os evolvedscope:eqversion:20.4

Trust: 1.0

sources: NVD: CVE-2021-0239

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-0239
value: MEDIUM

Trust: 1.0

sirt@juniper.net: CVE-2021-0239
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202104-1041
value: MEDIUM

Trust: 0.6

VULHUB: VHN-372141
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-0239
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-0239
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-372141
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-0239
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 2.0

sources: VULHUB: VHN-372141 // VULMON: CVE-2021-0239 // CNNVD: CNNVD-202104-1041 // NVD: CVE-2021-0239 // NVD: CVE-2021-0239

PROBLEMTYPE DATA

problemtype:CWE-754

Trust: 1.1

sources: VULHUB: VHN-372141 // NVD: CVE-2021-0239

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202104-1041

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202104-1041

PATCH

title:Juniper Networks Junos OS Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=148287

Trust: 0.6

sources: CNNVD: CNNVD-202104-1041

EXTERNAL IDS

db:NVDid:CVE-2021-0239

Trust: 1.8

db:JUNIPERid:JSA11134

Trust: 1.8

db:CNNVDid:CNNVD-202104-1041

Trust: 0.6

db:VULHUBid:VHN-372141

Trust: 0.1

db:VULMONid:CVE-2021-0239

Trust: 0.1

sources: VULHUB: VHN-372141 // VULMON: CVE-2021-0239 // CNNVD: CNNVD-202104-1041 // NVD: CVE-2021-0239

REFERENCES

url:https://kb.juniper.net/jsa11134

Trust: 1.8

url:https://vigilance.fr/vulnerability/junos-os-multiple-vulnerabilities-35081

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-0239

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/754.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-372141 // VULMON: CVE-2021-0239 // CNNVD: CNNVD-202104-1041 // NVD: CVE-2021-0239

SOURCES

db:VULHUBid:VHN-372141
db:VULMONid:CVE-2021-0239
db:CNNVDid:CNNVD-202104-1041
db:NVDid:CVE-2021-0239

LAST UPDATE DATE

2024-11-23T23:01:02.806000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-372141date:2021-04-27T00:00:00
db:VULMONid:CVE-2021-0239date:2021-04-27T00:00:00
db:CNNVDid:CNNVD-202104-1041date:2021-04-28T00:00:00
db:NVDid:CVE-2021-0239date:2024-11-21T05:42:16.777

SOURCES RELEASE DATE

db:VULHUBid:VHN-372141date:2021-04-22T00:00:00
db:VULMONid:CVE-2021-0239date:2021-04-22T00:00:00
db:CNNVDid:CNNVD-202104-1041date:2021-04-14T00:00:00
db:NVDid:CVE-2021-0239date:2021-04-22T20:15:08.943