An improper restriction of operations within the bounds of a memory buffer vulnerability in Juniper Networks Junos OS J-Web on SRX Series devices allows an attacker to cause Denial of Service (DoS) by sending certain crafted HTTP packets. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. When this issue occurs, web-management, NTP daemon (ntpd) and Layer 2 Control Protocol process (L2CPD) daemons might crash. This issue affects Juniper Networks Junos OS on SRX Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2;
Published 2021-04-22 20:15:09
Updated 2021-04-27 19:35:08
View at NVD,
Vulnerability category: OverflowDenial of service

Exploit prediction scoring system (EPSS) score for CVE-2021-0227

Probability of exploitation activity in the next 30 days EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2021-0227

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
Juniper Networks, Inc.

CWE ids for CVE-2021-0227

References for CVE-2021-0227

    2021-04 Security Bulletin: Junos OS: SRX Series: Denial of Service in J-Web upon receipt of a crafted HTTP packet (CVE-2021-0227) - Juniper Networks
    Vendor Advisory

Products affected by CVE-2021-0227

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to terms of use!