Vulnerability Details : CVE-2021-0286
A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) process to crash and restart, impacting all traffic going through the FPC, resulting in a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. Following messages will be logged prior to the crash: Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:32710470974358 label:1089551617 for session:18 probe:35 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:19241453497049 label:1089551617 for session:18 probe:37 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:19241453497049 label:1089551617 for session:18 probe:44 Feb 2 10:14:39 fpc0 evo-aftmand-bt[16263]: [Error] Nexthop: Failed to get fwd nexthop for nexthop:32710470974358 label:1089551617 for session:18 probe:47 Feb 2 10:14:39 fpc0 audit[16263]: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16263 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=11 Feb 2 10:14:39 fpc0 kernel: audit: type=1701 audit(1612260879.272:17): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16263 comm="EvoAftManBt-mai" exe="/usr/sbin/evo-aftmand-bt" sig=1 This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R2-EVO; 21.1 versions prior to 21.1R2-EVO.
Vulnerability category: Denial of service
Products affected by CVE-2021-0286
- cpe:2.3:o:juniper:junos_os_evolved:19.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:19.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:19.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:19.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:19.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:19.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:20.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:20.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:20.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-0286
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-0286
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
Juniper Networks, Inc. |
CWE ids for CVE-2021-0286
-
The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the product.Assigned by: sirt@juniper.net (Secondary)
-
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-0286
-
https://kb.juniper.net/JSA11188
2021-07 Security Bulletin: Junos OS Evolved: Specially crafted packets may cause the AFT manager process to crash and restart (CVE-2021-0286) - Juniper NetworksVendor Advisory
Jump to