vulnerability

Juniper Junos OS: 2021-04 Security Bulletin: Junos OS: EX2200-C/3200/3300/4200/4500/4550/6210/8208/8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core. (JSA11162) (CVE-2021-0271)

Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
04/16/2021
Added
04/16/2021
Modified
03/22/2022

Description

A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of the crafted ARP packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series. 12.3 versions prior to 12.3R12-S17; 15.1 versions prior to 15.1R7-S8. This issue only affects the listed Marvell-chipset based EX Series devices. No other products or platforms are affected.

Solution

juniper-junos-os-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.