Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: 2021-04 Security Bulletin: Junos OS: EX2200-C/3200/3300/4200/4500/4550/6210/8208/8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core. (JSA11162) (CVE-2021-0271)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Juniper Junos OS: 2021-04 Security Bulletin: Junos OS: EX2200-C/3200/3300/4200/4500/4550/6210/8208/8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core. (JSA11162) (CVE-2021-0271)

Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
04/16/2021
Created
04/16/2021
Added
04/16/2021
Modified
03/22/2022

Description

A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of the crafted ARP packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series. 12.3 versions prior to 12.3R12-S17; 15.1 versions prior to 15.1R7-S8. This issue only affects the listed Marvell-chipset based EX Series devices. No other products or platforms are affected.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;