CVE-2021-0297
Junos OS Evolved: BGP and LDP sessions with TCP MD5 authentication established with peers not configured for authentication
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled. This could lead to untrusted or unauthorized sessions being established, resulting in an impact on confidentiality or stability of the network. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.3R2-S1-EVO; 20.4 versions prior to 20.4R2-EVO; 21.1 versions prior to 21.1R2-EVO. Juniper Networks Junos OS is not affected by this issue.
Una vulnerabilidad en el procesamiento de la autenticación TCP MD5 en Juniper Networks Junos OS Evolved puede permitir a una sesión BGP o LDP configurada con autenticación MD5 tener éxito, incluso si el peer no tiene habilitada la autenticación TCP MD5. Esto podría conllevar a el establecimiento de sesiones no confiables o no autorizadas, lo que tendría un impacto en la confidencialidad o la estabilidad de la red. Este problema afecta a Juniper Networks Junos OS Evolved: Todas las versiones anteriores a 20.3R2-S1-EVO; versiones 20.4 anteriores a 20.4R2-EVO; versiones 21.1 anteriores a 21.1R2-EVO. Juniper Networks Junos OS no está afectado por este problema
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-10-27 CVE Reserved
- 2021-10-19 CVE Published
- 2024-06-28 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 20.3 Search vendor "Juniper" for product "Junos Os Evolved" and version "20.3" | r1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 20.3 Search vendor "Juniper" for product "Junos Os Evolved" and version "20.3" | r1-s1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 20.3 Search vendor "Juniper" for product "Junos Os Evolved" and version "20.3" | r2 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 20.4 Search vendor "Juniper" for product "Junos Os Evolved" and version "20.4" | r1 |
Affected
| ||||||
Juniper Search vendor "Juniper" | Junos Os Evolved Search vendor "Juniper" for product "Junos Os Evolved" | 21.1 Search vendor "Juniper" for product "Junos Os Evolved" and version "21.1" | r1 |
Affected
|