Learn about CVE-2021-31375, an Improper Input Validation vulnerability in Juniper Networks Junos OS that allows bypassing RPKI policy-checks via BGP updates. Update to the latest software releases for protection.
An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) allows an attacker to send a specific BGP update that may cause RPKI policy-checks to be bypassed, potentially enabling the acceptance or propagation of a spoofed advertisement.
Understanding CVE-2021-31375
This CVE impacts Juniper Networks Junos OS versions prior to specific releases, affecting systems with RPKI-based BGP origin validation.
What is CVE-2021-31375?
CVE-2021-31375 is an Improper Input Validation vulnerability in Juniper Networks Junos OS, allowing malicious actors to bypass RPKI policy-checks via a targeted BGP update.
The Impact of CVE-2021-31375
The vulnerability's impact is rated as HIGH with a CVSS base score of 7.2. It affects the integrity of the impacted systems without requiring any special privileges.
Technical Details of CVE-2021-31375
The vulnerability affects systems running specific versions of Juniper Networks Junos OS configured with BGP origin validation using RPKI.
Vulnerability Description
The vulnerability allows attackers to send malicious BGP updates to bypass RPKI policy-checks, potentially leading to the acceptance of fraudulent advertisements.
Affected Systems and Versions
Juniper Networks Junos OS versions prior to 12.3R12-S18, 15.1R7-S9, 17.2R3-S3, and more up to 19.3R2 are affected by this vulnerability.
Exploitation Mechanism
There is no known exploitation of CVE-2021-31375 as reported by Juniper SIRT.
Mitigation and Prevention
Implementing the provided software updates is crucial to mitigate the risks associated with CVE-2021-31375.
Immediate Steps to Take
Users are advised to update their Junos OS to the versions that address this specific issue promptly.
Long-Term Security Practices
Regularly updating and patching systems is essential to prevent vulnerabilities and ensure a secure network environment.
Patching and Updates
Juniper Networks has released updated software versions, including 12.3R12-S18, 15.1R7-S9, and subsequent releases, to resolve CVE-2021-31375.