CVE-2021-31351

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects specific versions of Juniper Networks Junos OS on MX Series: 17.3R3-S11; 17.4R2-S13; 17.4R3 prior to 17.4R3-S5; 18.1R3-S12; 18.2R2-S8, 18.2R3-S7, 18.2R3-S8; 18.3R3-S4; 18.4R3-S7; 19.1R3-S4, 19.1R3-S5; 19.2R1-S6; 19.3R3-S2; 19.4R2-S4, 19.4R2-S5; 19.4R3-S2; 20.1R2-S1; 20.2R2-S2, 20.2R2-S3, 20.2R3; 20.3R2, 20.3R2-S1; 20.4R1, 20.4R1-S1, 20.4R2; 21.1R1; This issue does not affect any version of Juniper Networks Junos OS prior to 15.1X49-D240;
Overview
  • CVE ID
  • CVE-2021-31351
  • Assigner
  • sirt@juniper.net
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-10-19T19:15:08
  • Last Modified Date
  • 2021-10-25T21:27:00
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:juniper:junos:17.3:r3-s11:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r2-s13:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:17.4:r3-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.1:r3-s12:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.2:r3-s7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.2:r3-s8:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* 1 OR
cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:* 1 OR
cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://kb.juniper.net/JSA11216 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:49:56 Added to TrackCVE
2022-12-05 12:41:00 2021-10-19T19:15Z 2021-10-19T19:15:08 CVE Published Date updated
2022-12-05 12:41:01 2021-10-25T21:27:00 CVE Modified Date updated
2022-12-05 12:41:01 Analyzed Vulnerability Status updated