Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2021-0208
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition. Continued receipt of the packet will sustain the Denial of Service. This issue affects: Juniper Networks Junos OS: All versions prior to 17.3R3-S10 except 15.1X49-D240 for SRX series; 17.4 versions prior to 17.4R3-S2; 18.1 versions prior to 18.1R3-S10; 18.2 versions prior to 18.2R2-S7, 18.2R3-S4; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R1-S8, 18.4R2-S6, 18.4R3-S2; 19.1 versions prior to 19.1R1-S5, 19.1R3-S3; 19.2 versions prior to 19.2R3; 19.3 versions prior to 19.3R2-S5, 19.3R3; 19.4 versions prior to 19.4R2-S2, 19.4R3-S1; 20.1 versions prior to 20.1R1-S4, 20.1R2; 15.1X49 versions prior to 15.1X49-D240 on SRX Series. Juniper Networks Junos OS Evolved: 19.3 versions prior to 19.3R2-S5-EVO; 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S4-EVO..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 3.3/10
- Exploit Score
- 6.5/10
- Access Vector
- Adjacent_network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- High
- Base Score
- 8.8/10
- Exploit Score
- 2.8/10
- Access Vector
- Adjacent_network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 5.9/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d15:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d25:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d180:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d200:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d210:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:15.1x49:d190:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:* |
Yes
|
- | ||
cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* |
No
|
- |