Discover the vulnerability in Juniper Networks Junos OS impacting ACX5448, ACX710 routers. Learn about the impact, affected versions, and mitigation steps.
A vulnerability in Juniper Networks Junos OS running on the ACX5448 and ACX710 platforms may cause BFD sessions to flap due to a high rate of transit ARP packets, potentially leading to a Denial of Service (DoS) condition.
Understanding CVE-2021-0216
This CVE describes a vulnerability in Juniper Networks Junos OS that affects the ACX5448 and ACX710 platforms, impacting the stability of routing protocols.
What is CVE-2021-0216?
The vulnerability in Junos OS may cause BFD sessions to flap when the affected platforms receive a high rate of transit ARP packets. This can disrupt routing protocols and network stability, ultimately resulting in a Denial of Service (DoS) condition.
The Impact of CVE-2021-0216
The vulnerability affects Juniper Networks Junos OS versions on ACX5448 and ACX710 platforms, leading to BFD sessions flapping. This issue could impact routing protocols and network stability.
Technical Details of CVE-2021-0216
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability in Juniper Networks Junos OS may cause BFD sessions to flap due to a high rate of transit ARP packets on ACX5448 and ACX710 platforms, potentially resulting in a Denial of Service (DoS) condition.
Affected Systems and Versions
Junos OS versions 18.2 to 20.2 on ACX5448 and ACX710 platforms are affected by this vulnerability.
Exploitation Mechanism
Juniper SIRT has not detected any malicious exploitation of this vulnerability.
Mitigation and Prevention
Learn how to mitigate the impact of CVE-2021-0216.
Immediate Steps to Take
Upgrade to the following Junos OS versions to address this vulnerability: 18.2R3-S8, 18.3R3-S5, 18.4R1-S6, 18.4R3-S7, 19.1R3-S5, 19.2R2, 19.2R3, 19.3R3, 19.4R3, 20.1R2, 20.2R2, 20.3R1, or later releases.
Long-Term Security Practices
Implement best security practices to protect against similar vulnerabilities in the future.
Patching and Updates
Apply the provided software patches to prevent BFD sessions from flapping due to transit ARP packets.