// For flags

CVE-2021-0267

Junos OS: Receipt of a crafted DHCP packet will cause the jdhcpd DHCP service to core.

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An Improper Input Validation vulnerability in the active-lease query portion in JDHCPD's DHCP Relay Agent of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending a crafted DHCP packet to the device thereby crashing the jdhcpd DHCP service. This is typically configured for Broadband Subscriber Sessions. Continued receipt and processing of this crafted packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Junos OS Evolved.

Una vulnerabilidad de Comprobación de Entrada Inapropiada en una porción de consulta active-lease en DHCP Relay Agent de JDHCPD de Juniper Networks Junos OS, permite a un atacante causar una Denegación de Servicio (DoS) mediante el envío de un paquete DHCP diseñado hacia el dispositivo, lo que bloquea el servicio DHCP jdhcpd. Por lo general, se configura para Broadband Subscriber Sessions. La recepción y el procesamiento continuo de este paquete diseñado creará una condición sostenida de Denegación de Servicio (DoS). Este problema afecta a Juniper Networks Junos OS: versiones 19.4 anteriores a 19.4R3-S1; versiones 20.1 anteriores a 20.1R2-S1, 20.1R3; 20.2 versiones anteriores a 20.2R3; 20.3 versiones anteriores a 20.3R2. Este problema no afecta a Junos OS Evolved

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-27 CVE Reserved
  • 2021-04-22 CVE Published
  • 2024-01-06 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r2-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r2-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s4
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1-s3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r2-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r2-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r2-s3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.3
Search vendor "Juniper" for product "Junos" and version "20.3"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.3
Search vendor "Juniper" for product "Junos" and version "20.3"
r1-s1
Affected