CVE-2021-31377
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/10/2021
Last modified:
25/10/2021
Description
An Incorrect Permission Assignment for Critical Resource vulnerability of a certain file in the filesystem of Junos OS allows a local authenticated attacker to cause routing process daemon (RPD) to crash and restart, causing a Denial of Service (DoS). Repeated actions by the attacker will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S12; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5; 18.1 versions prior to 18.1R3-S13; 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R2-S8, 18.4R3-S7; 19.1 versions prior to 19.1R2-S3, 19.1R3-S5; 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R2-S3, 20.2R3; 20.3 versions prior to 20.3R3; 20.4 versions prior to 20.4R1-S1, 20.4R2.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



