Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-31367 : Vulnerability Insights and Analysis

Learn about CVE-2021-31367, a Denial of Service vulnerability in Juniper Networks Junos OS PTX Series. Understand the impacts, affected versions, and mitigation steps.

A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows an adjacent attacker to cause a Denial of Service (DoS) by sending genuine BGP flowspec packets. This can lead to an FPC heap memory leak, triggering an FPC crash. Read on to understand the impact, technical details, mitigation steps, and more related to CVE-2021-31367.

Understanding CVE-2021-31367

This section provides a detailed overview of the CVE-2021-31367 vulnerability affecting Juniper Networks Junos OS on PTX Series.

What is CVE-2021-31367?

A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows an adjacent attacker to cause a Denial of Service (DoS) by sending genuine BGP flowspec packets, resulting in an FPC heap memory leak.

The Impact of CVE-2021-31367

The vulnerability can lead to a sustained Denial of Service (DoS) condition by causing the FPC to crash and restart along with a core dump. Juniper Networks Junos Evolved is not affected by this vulnerability.

Technical Details of CVE-2021-31367

Let's dive into the technical aspects of this vulnerability.

Vulnerability Description

The issue affects Junos OS devices with the BGP FlowSpec configured.

Affected Systems and Versions

The vulnerability impacts Junos OS versions prior to 18.4R3-S9, 19.1R3-S7, 19.2R1-S7, 19.2R3-S3, 19.3R2-S6, 19.3R3-S3, 19.4R1-S4, 20.1R2-S2, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2.

Exploitation Mechanism

Juniper SIRT has not detected any malicious exploitation of this vulnerability.

Mitigation and Prevention

Learn how to mitigate the risks associated with CVE-2021-31367.

Immediate Steps to Take

Apply the provided software releases: 18.4R3-S9, 19.1R3-S7, 19.2R1-S7, 19.2R3-S3, 19.3R2-S6, 19.3R3-S3, 19.4R1-S4, 20.1R2-S2, 20.1R3, 20.2R3-S1, 20.3R3, 20.4R3, 21.1R2, 21.2R1, and subsequent releases to resolve this issue.

Long-Term Security Practices

Enhance your network security practices to prevent similar vulnerabilities in the future.

Patching and Updates

Regularly update your Junos OS to the latest patches and releases to stay protected against known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now