Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2021-0235

CVE information

Published

3 years ago

Last Modified

2 years ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

High

Impact Analysis

Description

On SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3, vSRX Series devices using tenant services on Juniper Networks Junos OS, due to incorrect permission scheme assigned to tenant system administrators, a tenant system administrator may inadvertently send their network traffic to one or more tenants while concurrently modifying the overall device system traffic management, affecting all tenants and the service provider. Further, a tenant may inadvertently receive traffic from another tenant. This issue affects: Juniper Networks Junos OS 18.3 version 18.3R1 and later versions on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2; 18.4 version 18.4R1 and later versions on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3; 19.1 versions 19.1R1 and later versions on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2 on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3; 19.3 versions prior to 19.3R3-S2 on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3; 19.4 versions prior to 19.4R2-S4, 19.4R3-S2 on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3; 20.1 versions prior to 20.1R2, 20.1R3 on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3 vSRX Series; 20.2 versions prior to 20.2R2-S1, 20.2R3 on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3 vSRX Series; 20.3 versions prior to 20.3R1-S2, 20.3R2 on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3 vSRX Series; 20.4 versions prior to 20.4R1, 20.4R2 on SRX1500, SRX4100, SRX4200, SRX4600, SRX5000 Series with SPC2/SPC3 vSRX Series. This issue does not affect Juniper Networks Junos OS versions prior to 18.3R1..

CVSSv2.0 Score

Severity
Medium
Base Score
4.6/10
Exploit Score
3.9/10
Access Vector
Local
Access Complexity
Low
Authentication Required
None
Impact Score
6.4/10
Confidentiality Impact
Partial
Availability Impact
Partial
Integrity Impact
Partial

CVSSv3.1 Score

Severity
High
Base Score
7.3/10
Exploit Score
1.5/10
Access Vector
Local
Access Complexity
Low
Privileges Required
High
Impact Score
5.3/10
Confidentiality Impact
Low
Availability Impact
Low
Integrity Impact
High
Scope
Changed
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*
  No
-