// For flags

CVE-2021-0287

Junos OS and Junos OS Evolved: RPD could crash in SR-ISIS/MPLS environment due to a flap of an ISIS link in the network

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued link flaps will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 19.4 versions prior to 19.4R1-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R2; Juniper Networks Junos OS Evolved: 20.3-EVO versions prior to 20.3R2-EVO; 20.4-EVO versions prior to 20.4R2-EVO. This issue does not affect: Juniper Networks Junos OS releases prior to 19.4R1. Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.

En un entorno de Enrutamiento por Segmentos ISIS (SR-ISIS)/MPLS, en los dispositivos Juniper Networks Junos OS y Junos OS Evolved, configurados con el Algoritmo Flexible ISIS para el Enrutamiento por Segmentos y las estadísticas basadas en sensores, un flap de un enlace ISIS en la red puede conllevar a el bloqueo y el reinicio de un demonio en el proceso de enrutamiento (RPD), causando una Denegación de Servicio (DoS). Un continuo enlace en los flaps creará una condición de Denegación de Servicio (DoS) sostenida. Este problema afecta a: Juniper Networks Junos OS: Versiones 19.4 anteriores a 19.4R1-S4, 19.4R3-S2; versiones 20.1 anteriores a 20.1R2-S1, 20.1R3; versiones 20.2 anteriores a 20.2R2-S2, 20.2R3; versiones 20.3 anteriores a 20.3R2; Juniper Networks Junos OS Evolved: versiones 20.3-EVO anteriores a 20.3R2-EVO; versiones 20.4-EVO anteriores a 20.4R2-EVO. Este problema no afecta a: Las versiones de Juniper Networks Junos OS anteriores a 19.4R1. Las versiones de Juniper Networks Junos OS Evolved anteriores a 19.4R1-EVO

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-27 CVE Reserved
  • 2021-07-15 CVE Published
  • 2024-03-29 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
URL Date SRC
https://kb.juniper.net/JSA11189 2021-10-25
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r1-s3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r2-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r2-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r2-s3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
19.4
Search vendor "Juniper" for product "Junos" and version "19.4"
r3-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r1-s4
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.1
Search vendor "Juniper" for product "Junos" and version "20.1"
r2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1-s2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r1-s3
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r2
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.2
Search vendor "Juniper" for product "Junos" and version "20.2"
r2-s1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.3
Search vendor "Juniper" for product "Junos" and version "20.3"
r1
Affected
Juniper
Search vendor "Juniper"
Junos
Search vendor "Juniper" for product "Junos"
20.3
Search vendor "Juniper" for product "Junos" and version "20.3"
r1-s1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
20.3
Search vendor "Juniper" for product "Junos Os Evolved" and version "20.3"
-
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
20.3
Search vendor "Juniper" for product "Junos Os Evolved" and version "20.3"
r1
Affected
Juniper
Search vendor "Juniper"
Junos Os Evolved
Search vendor "Juniper" for product "Junos Os Evolved"
20.4
Search vendor "Juniper" for product "Junos Os Evolved" and version "20.4"
r1-s1
Affected