Get started for free to scan for vulnerabilites.

Download Mageni to scan for vulnerabilities. It is free to get started and can be installed in Windows, macOS and Linux.

CVE-2021-0263

CVE information

Published

1 year ago

Last Modified

1 year ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

Medium

Impact Analysis

Description

A Data Processing vulnerability in the Multi-Service process (multi-svcs) on the FPC of Juniper Networks Junos OS on the PTX Series routers may lead to the process becoming unresponsive, ultimately affecting traffic forwarding, allowing an attacker to cause a Denial of Service (DoS) condition . The Multi-Service Process running on the FPC is responsible for handling sampling-related operations when a J-Flow configuration is activated. This can occur during periods of heavy route churn, causing the Multi-Service Process to stop processing updates, without consuming any further updates from kernel. This back pressure towards the kernel affects further dynamic updates from other processes in the system, including RPD, causing a KRT-STUCK condition and traffic forwarding issues. An administrator can monitor the following command to check if there is the KRT queue is stuck: user@device > show krt state ... Number of async queue entries: 65007 <--- this value keep on increasing. The following logs/alarms will be observed when this condition exists: user@junos> show chassis alarms 2 alarms currently active Alarm time Class Description 2020-10-11 04:33:45 PDT Minor Potential slow peers are: MSP(FPC1-PIC0) MSP(FPC3-PIC0) MSP(FPC4-PIC0) Logs: Oct 11 04:33:44.672 2020 test /kernel: rts_peer_cp_recv_timeout : Bit set for msp8 as it is stuck Oct 11 04:35:56.000 2020 test-lab fpc4 user.err gldfpc-multi-svcs.elf: Error in parsing composite nexthop Oct 11 04:35:56.000 2020 test-lab fpc4 user.err gldfpc-multi-svcs.elf: composite nexthop parsing error Oct 11 04:43:05 2020 test /kernel: rt_pfe_veto: Possible slowest client is msp38. States processed - 65865741. States to be processed - 0 Oct 11 04:55:55 2020 test /kernel: rt_pfe_veto: Memory usage of M_RTNEXTHOP type = (0) Max size possible for M_RTNEXTHOP type = (8311787520) Current delayed unref = (60000), Current unique delayed unref = (10896), Max delayed unref on this platform = (40000) Current delayed weight unref = (71426) Max delayed weight unref on this platform= (400000) curproc = rpd Oct 11 04:56:00 2020 test /kernel: rt_pfe_veto: Too many delayed route/nexthop unrefs. Op 2 err 55, rtsm_id 5:-1, msg type 2 This issue only affects PTX Series devices. No other products or platforms are affected by this vulnerability. This issue affects Juniper Networks Junos OS on PTX Series: 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S8, 18.4R3-S7; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.2R1..

CVSSv2.0 Score

Severity
Medium
Base Score
4.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

CVSSv3.1 Score

Severity
Medium
Base Score
5.9/10
Exploit Score
2.2/10
Access Vector
Network
Access Complexity
High
Privileges Required
None
Impact Score
3.6/10
Confidentiality Impact
None
Availability Impact
High
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:*
  No
-

Know your vulnerabilities for free. Start using Mageni today.

Mageni can help you to find, assess and manage your vulnerabilities.

Get Started for Free
How Mageni can help you?

How Mageni can help you?

Mageni can help you to know and remediate your vulnerabilities reducing your risk exposure and minimizing the likelihood of a data breach while decreasing your spending.

60% of breach victims were breached due to an unpatched known vulnerability1

62% were unaware that they were vulnerable prior to the data breach1

$4.24 million cost per data breach on average; highest in 17-year report history2

Citations 1. Costs and Consequences of Gaps in Vulnerability Response, Ponemom Institute 2. Cost of a Data Breach Report 2021, IBM

Mageni makes easy to find, prioritize, and remediate the vulnerabilities

Supported by industry-leading vulnerability intelligence and CompTIA PenTest+ professionals, Mageni puts security expertise in your hands.

Internal and External Scans

Scan your internal and public assets for vulnerabilities.

Remediate

Get the recommendations to mitigate the risks and vulnerabilities.

Secure your Applications

Scan third-party applications like Java, Chrome, Adobe and more.

Comprehensive Coverage

Scan servers, workstations and network devices for vulnerabilities.

Report and Analyze

Receive a report of the vulnerabilities that affect your assets.

More visibility

Perform non-credentialed or credentialed scans.

Prioritize

Prioritize the vulnerabilities based on CVSS, severity and other variables.

SSL Certificates

Improve the security of your secure layer and certificates.

Simple and transparent pricing

Get started for free with 7 days trial plus Money-Back Guarantee for 7 days after the end of the trial

Stop worrying about your budget or licenses limits

Mageni provides unlimited vulnerability scans for unlimited assets at a fixed price so you don't have to worry anymore about your budget or license limits.

What's included

  • Unlimited vulnerability scans for unlimited assets

  • Support by Certified CompTIA PenTest+ Professional

  • Access to Support Portal

  • Email Support Monday through Friday 9AM-5PM EST

  • Vulnerability Database Updates

  • Software Maintenance with Patches and Bug Fixes

  • Unlimited Support Cases

  • Software Updates and Upgrades

Why should I get a subscription now?

Enjoy the peace of mind and confidence that comes from having Mageni working for you.

For the Earth

Like you, we love the planet, that's why Mageni is a Stripe Climate member and 1% of your subscription goes to carbon removal.

Start for Free plus Money-back Guarantee

Get started for free with 7 days trial plus your eligible for a full reimbursement within 7 calendar days of the end of your trial. You don't need a reason to request a refund and we won't ask you a question.

Talk to a CompTIA Pentest+ when you need

CompTIA PenTest+ is the certification for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA Pentest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Payments Processed By Stripe

For your security all subscriptions made through this website (mageni.net) are processed by Stripe (stripe.com). Stripe has been audited by an independent PCI Qualified Security Assessor (QSA) and is certified as a PCI Level 1 Service Provider. This is the most stringent level of certification available in the payments industry.

Frequently asked questions

Can’t find the answer? Send an email to help@mageni.net

Do you offer a free plan?
No, and the reason is that to provide you a great service Mageni have invested heavily in people, process and technology. The personal developing the product and providing support is CompTIA PenTest+ certified. The infrastructure uses Amazon AWS datacenters which are state of the art. So the subscription is priced at only $4 USD per month to provide you a great service at the most affordable price.
Can I install Mageni in Windows, macOS and Linux?
Yes, please read the documentation for details.
Can I get a refund?
Yes, contact us within the first 7 days after the end of the trial and we'll send you the refund. No questions asked
Who process my credit card information?
Stripe a PCI DSS Certified payment platform
Can I cancel the subscription?
Yes, please feel free to cancel your subscription at anytime
Can I pause the subscription?
Yes, please feel free to pause your subscription at anytime. While is paused it won't generate charges but you won't receive updates.
Can I delete my account?
Yes, please feel free to do so at anytime, just make sure that prior to that you cancel your subscription
What are support hours?
Monday to Friday from 9AM to 5PM EST (New York)
Can I verify the CompTIA Pentest+ Certification?
Yes, please contact us
Is this subscription a contract?
No, you can cancel it at anytime that you wish.
How can I open a support ticket?
Please visit the support portal
Is the license limited per installation?
If you are a MSP (Managed Service Provider) or a Security Company, yes, the license is limited and please contact us for pricing. If you are an organization who whishes to install it on many branches the license is not limited and you can use the same license to install Mageni in your branches.

Ready to get started? Start you 7-day free trial