Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2021-0207

PUBLISHED 17.09.2024

CNA: juniper

NFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series: Certain genuine traffic received by the Junos OS device will be discarded instead of forwarded.

Обновлено: 15.01.2021
An improper interpretation conflict of certain data between certain software components within the Juniper Networks Junos OS devices does not allow certain traffic to pass through the device upon receipt from an ingress interface filtering certain specific types of traffic which is then being redirected to an egress interface on a different VLAN. This causes a Denial of Service (DoS) to those clients sending these particular types of traffic. Such traffic being sent by a client may appear genuine, but is non-standard in nature and should be considered as potentially malicious, and can be targeted to the device, or destined through it for the issue to occur. This issues affects IPv4 and IPv6 traffic. An indicator of compromise may be found by checking log files. You may find that traffic on the input interface has 100% of traffic flowing into the device, yet the egress interface shows 0 pps leaving the device. For example: [show interfaces "interface" statistics detail] Output between two interfaces would reveal something similar to: Ingress, first interface: -------------------- Interface Link Input packets (pps) Output packets (pps) et-0/0/0 Up 9999999999 (9999) 1 (0) -------------------- Egress, second interface: -------------------- Interface Link Input packets (pps) Output packets (pps) et-0/0/1 Up 0 (0) 9999999999 (0) -------------------- Dropped packets will not show up in DDoS monitoring/protection counters as issue is not caused by anti-DDoS protection mechanisms. This issue affects: Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S7 on NFX250, QFX5K Series, EX4600; 17.4 versions prior to 17.4R2-S11, 17.4R3-S3 on NFX250, QFX5K Series, EX4600; 18.1 versions prior to 18.1R3-S9 on NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4600; 18.2 versions prior to 18.2R3-S3 on NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600; 18.3 versions prior to 18.3R3-S1 on NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series; 18.4 versions prior to 18.4R1-S5, 18.4R2-S3, 18.4R3 on NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series; 19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3 on NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series; 19.2 versions prior to 19.2R1-S5, 19.2R2 on NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series; 19.3 versions prior to 19.3R2-S3, 19.3R3 on NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series; 19.4 versions prior to 19.4R1-S2, 19.4R2 on NFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series. This issue does not affect Junos OS releases prior to 17.2R2.

CWE

Идентификатор Описание
CWE-115 CWE-115 Misinterpretation of Input
CWE-436 CWE-436: Interpretation Conflict

БДУ ФСТЭК

Идентификатор Описание
BDU:2021-00996 Уязвимость операционной системы Junos маршрутизаторов серий NFX250, QFX5K, EX2300, EX3400 , EX4300 Multigigabit и EX4600, связанная с возникновением конфликта интерпретаций, позволяющая нарушителю вызвать отказ в обслуживании

CVSS

Оценка Severity Версия Базовый вектор
7.5 HIGH 3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Доп. Информация

Product Status

Junos OS
Product: Junos OS
Vendor: Juniper Networks
Default status: Не определен
Platforms:
  • NFX250, QFX5K Series, EX4600
Версии:
Затронутые версии Статус
Наблюдалось в версиях от 17.3 до 17.3R3-S7 affected
Наблюдалось в версиях от 17.4 до 17.4R2-S11, 17.4R3-S3 affected
Junos OS
Product: Junos OS
Vendor: Juniper Networks
Default status: Не определен
Platforms:
  • NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4600
Версии:
Затронутые версии Статус
Наблюдалось в версиях от 18.1 до 18.1R3-S9 affected
Junos OS
Product: Junos OS
Vendor: Juniper Networks
Default status: Не определен
Platforms:
  • NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600
Версии:
Затронутые версии Статус
Наблюдалось в версиях от 18.2 до 18.2R3-S3 affected
Junos OS
Product: Junos OS
Vendor: Juniper Networks
Default status: Не определен
Platforms:
  • NFX250, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series
Версии:
Затронутые версии Статус
Наблюдалось в версиях от 18.3 до 18.3R3-S1 affected
Наблюдалось в версиях от 18.4 до 18.4R1-S5, 18.4R2-S3, 18.4R3 affected
Наблюдалось в версиях от 19.1 до 19.1R1-S5, 19.1R2-S1, 19.1R3 affected
Наблюдалось в версиях от 19.2 до 19.2R1-S5, 19.2R2 affected
Наблюдалось в версиях от 19.3 до 19.3R2-S3, 19.3R3 affected
Junos OS
Product: Junos OS
Vendor: Juniper Networks
Default status: Не определен
Platforms:
  • NFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Series
Версии:
Затронутые версии Статус
Наблюдалось в версиях от 19.4 до 19.4R1-S2, 19.4R2 affected
 

Ссылки

CVE Program Container

Обновлено: 03.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.