CVE-2021-0267

CVE information

Published

1 year ago

Last Modified

10 months ago

CVSSv2.0 Severity

Low

CVSSv3.1 Severity

Medium

Impact Analysis

Description

An Improper Input Validation vulnerability in the active-lease query portion in JDHCPD's DHCP Relay Agent of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending a crafted DHCP packet to the device thereby crashing the jdhcpd DHCP service. This is typically configured for Broadband Subscriber Sessions. Continued receipt and processing of this crafted packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Junos OS Evolved..

CVSSv2.0 Score

Severity
Low
Base Score
3.3/10
Exploit Score
6.5/10
Access Vector
Adjacent_network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

CVSSv3.1 Score

Severity
Medium
Base Score
6.5/10
Exploit Score
2.8/10
Access Vector
Adjacent_network
Access Complexity
Low
Privileges Required
None
Impact Score
3.6/10
Confidentiality Impact
None
Availability Impact
High
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*
  Yes
- -

Get started for free to scan for vulnerabilities

Companies of all sizes use Mageni Vulnerability Scanner. Is free for 7-days then $39 monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.

Get Started For Free
App screenshot