CVE-2021-0229
Severity CVSS v4.0:
Pending analysis
Type:
CWE-400
Uncontrolled Resource Consumption ('Resource Exhaustion')
Publication date:
22/04/2021
Last modified:
27/04/2021
Description
An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (JET) application designed with a listening port uses the Message Queue Telemetry Transport (MQTT) protocol to connect to a mosquitto broker that is running on Junos OS to subscribe for events. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 16.1R1 and later versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 16.1R1.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



