2021-0277 | Juniper Junos OS/Junos OS Evolved l2cpd out-of-bounds read (JSA11181)

CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
8.4 $0-$5k 0.82

A vulnerability, which was classified as critical, was found in Juniper Junos OS and Junos OS Evolved (Router Operating System) (the affected version unknown). This affects an unknown functionality of the component l2cpd. The manipulation with an unknown input leads to a information disclosure vulnerability. CWE is classifying the issue as CWE-125. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:

An Out-of-bounds Read vulnerability in the processing of specially crafted LLDP frames by the Layer 2 Control Protocol Daemon (l2cpd) of Juniper Networks Junos OS and Junos OS Evolved may allow an attacker to cause a Denial of Service (DoS), or may lead to remote code execution (RCE). Continued receipt and processing of these frames, sent from the local broadcast domain, will repeatedly crash the l2cpd process and sustain the Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 12.3 versions prior to 12.3R12-S18; 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S12; 17.4 versions prior to 17.4R2-S13, 17.4R3-S5; 18.1 versions prior to 18.1R3-S13; 18.2 versions prior to 18.2R3-S8; 18.3 versions prior to 18.3R3-S5; 18.4 versions prior to 18.4R2-S8, 18.4R3-S8; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S2; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3-S3; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2. Juniper Networks Junos OS Evolved versions prior to 20.4R2-EVO.

The weakness was published 07/16/2021 as JSA11181. The advisory is shared at kb.juniper.net. This vulnerability is uniquely identified as CVE-2021-0277 since 10/27/2020. The exploitability is told to be easy. The attack can only be done within the local network. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 07/19/2021).

Upgrading eliminates this vulnerability.




VulDB Meta Base Score: 8.8
VulDB Meta Temp Score: 8.4

VulDB Base Score: 8.8
VulDB Temp Score: 8.4
VulDB Vector: 🔒
VulDB Reliability: 🔍

🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
🔍 🔍 🔍 🔍 🔍 🔍
Vector Complexity Authentication Confidentiality Integrity Availability
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock
unlock unlock unlock unlock unlock unlock

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Information disclosure
CWE: CWE-125
ATT&CK: Unknown

Local: No
Remote: Partially

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: kb.juniper.net

10/27/2020 CVE assigned
07/16/2021 +261 days Advisory disclosed
07/16/2021 +0 days VulDB entry created
07/19/2021 +3 days VulDB last updateVendor: https://www.juniper.net/

Advisory: JSA11181
Status: Confirmed
Confirmation: 🔒

CVE: CVE-2021-0277 (🔒)

Created: 07/16/2021 08:05
Updated: 07/19/2021 02:56
Changes: (1) source_cve_cna
Complete: 🔍

Enable the mail alert feature now!

Source link