// For flags

CVE-2021-0239

Junos OS Evolved: Denial of Service due to receipt of specific genuine layer 2 frames.

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations within the packet forwarding engine (PFE) to crash and restart, leading to a Denial of Service (DoS) condition. By continuously sending this specific stream of genuine Layer 2 frames, an attacker can repeatedly crash the PFE, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R1-EVO. This issue does not affect Junos OS versions.

En Juniper Networks, Junos OS Evolved, la recepción de un flujo de tramas de capa 2 genuinas específicas puede causar que el proceso de gestión Advanced Forwarding Toolkit (AFT) (Evo-aftmand), responsable de gestionar las operaciones de ruta, clase de servicio (CoS) y cortafuegos. dentro del packet forwarding engine (PFE) para bloquearse y reiniciarse, conllevando a una condición de Denegación de Servicio (DoS). Al enviar continuamente este flujo específico de tramas genuinas de Capa 2, Un atacante puede ser capaz de bloquear repetidamente el PFE, provocando una Denegación de Servicio (DoS) sostenida. Este problema afecta a Juniper Networks Junos OS Evolved: todas las versiones anteriores a 20.4R1-EVO. Este problema no afecta a Junos OS versiones

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-27 CVE Reserved
  • 2021-04-22 CVE Published
  • 2024-01-06 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA11134 2021-04-27
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
20.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "20.4"
r1
Affected