Cloud Defense Logo

Products

Solutions

Company

CVE-2021-31375 : What You Need to Know

Learn about CVE-2021-31375, an Improper Input Validation vulnerability in Juniper Networks Junos OS that allows bypassing RPKI policy-checks via BGP updates. Update to the latest software releases for protection.

An Improper Input Validation vulnerability in routing process daemon (RPD) of Juniper Networks Junos OS devices configured with BGP origin validation using Resource Public Key Infrastructure (RPKI) allows an attacker to send a specific BGP update that may cause RPKI policy-checks to be bypassed, potentially enabling the acceptance or propagation of a spoofed advertisement.

Understanding CVE-2021-31375

This CVE impacts Juniper Networks Junos OS versions prior to specific releases, affecting systems with RPKI-based BGP origin validation.

What is CVE-2021-31375?

CVE-2021-31375 is an Improper Input Validation vulnerability in Juniper Networks Junos OS, allowing malicious actors to bypass RPKI policy-checks via a targeted BGP update.

The Impact of CVE-2021-31375

The vulnerability's impact is rated as HIGH with a CVSS base score of 7.2. It affects the integrity of the impacted systems without requiring any special privileges.

Technical Details of CVE-2021-31375

The vulnerability affects systems running specific versions of Juniper Networks Junos OS configured with BGP origin validation using RPKI.

Vulnerability Description

The vulnerability allows attackers to send malicious BGP updates to bypass RPKI policy-checks, potentially leading to the acceptance of fraudulent advertisements.

Affected Systems and Versions

Juniper Networks Junos OS versions prior to 12.3R12-S18, 15.1R7-S9, 17.2R3-S3, and more up to 19.3R2 are affected by this vulnerability.

Exploitation Mechanism

There is no known exploitation of CVE-2021-31375 as reported by Juniper SIRT.

Mitigation and Prevention

Implementing the provided software updates is crucial to mitigate the risks associated with CVE-2021-31375.

Immediate Steps to Take

Users are advised to update their Junos OS to the versions that address this specific issue promptly.

Long-Term Security Practices

Regularly updating and patching systems is essential to prevent vulnerabilities and ensure a secure network environment.

Patching and Updates

Juniper Networks has released updated software versions, including 12.3R12-S18, 15.1R7-S9, and subsequent releases, to resolve CVE-2021-31375.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now