Discover the impact of CVE-2021-31374 affecting Juniper Networks Junos OS and Junos OS Evolved. Learn about the vulnerability, its technical details, and mitigation steps to secure your network.
On October 13, 2021, Juniper Networks reported a vulnerability affecting Junos OS and Junos OS Evolved. The vulnerability involves a routing process daemon (RPD) crash and restart on devices processing a specially crafted BGP UPDATE or KEEPALIVE message, leading to a Denial of Service (DoS) condition. This impacts both IBGP and EBGP deployments over IPv4 or IPv6 networks.
Understanding CVE-2021-31374
This section delves into the details of the CVE-2021-31374 vulnerability.
What is CVE-2021-31374?
The CVE-2021-31374 vulnerability occurs in Juniper Networks Junos OS and Junos OS Evolved due to the processing of malicious BGP UPDATE or KEEPALIVE messages, resulting in an RPD crash and subsequent restart, leading to a DoS condition.
The Impact of CVE-2021-31374
The vulnerability has a high severity impact, with a CVSS base score of 7.5. It can disrupt the availability of affected devices, potentially causing a sustained DoS condition.
Technical Details of CVE-2021-31374
This section provides technical insights into the CVE-2021-31374 vulnerability.
Vulnerability Description
The vulnerability arises from the processing of specially crafted BGP messages, triggering RPD crashes and subsequent restarts.
Affected Systems and Versions
Devices running Juniper Networks Junos OS versions prior to 20.3R2-EVO are affected by this vulnerability.
Exploitation Mechanism
The exploit involves sending specific BGP UPDATE or KEEPALIVE messages to vulnerable devices, causing RPD crashes.
Mitigation and Prevention
To address the CVE-2021-31374 vulnerability, Juniper Networks has provided the following solutions:
Immediate Steps to Take
Apply the relevant software updates released by Juniper Networks to mitigate the vulnerability.
Long-Term Security Practices
Regularly update Junos OS and Junos OS Evolved to the latest versions to ensure protection against known vulnerabilities.
Patching and Updates
Update to the following software releases to resolve the issue: