CVE-2021-31361
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/10/2021
Last modified:
27/10/2022
Description
An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based attacker to cause increased FPC CPU utilization by sending specific IP packets which are being VXLAN encapsulated leading to a partial Denial of Service (DoS). Continued receipted of these specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on QFX Series: All versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S3, 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. Juniper Networks Junos OS on PTX Series: All versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2.
Impact
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page