Vulnerability Details : CVE-2021-0206
A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to send a specific packet causing the packet forwarding engine (PFE) to crash and restart, resulting in a Denial of Service (DoS). By continuously sending these specific packets, an attacker can repeatedly disable the PFE causing a sustained Denial of Service (DoS). This issue only affects Juniper Networks NFX Series, SRX Series platforms when SSL Proxy is configured. This issue affects Juniper Networks Junos OS on NFX Series and SRX Series: 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S1; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3; 19.2 versions prior to 19.2R1-S2, 19.2R2; 19.3 versions prior to 19.3R2. This issue does not affect Juniper Networks Junos OS versions on NFX Series and SRX Series prior to 18.3R1.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2021-0206
- cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-0206
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-0206
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2021-0206
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Primary)
- sirt@juniper.net (Secondary)
References for CVE-2021-0206
-
https://kb.juniper.net/JSA11096
2021-01 Security Bulletin: Junos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL Proxy is configured. (CVE-2021-0206) - Juniper NetworksVendor Advisory
Jump to