cve-2021-0271
Vulnerability from cvelistv5
Published
2021-04-22 19:37
Modified
2024-09-16 16:59
Summary
Junos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core.
References
Impacted products
Juniper NetworksJunos OS
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.507Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://kb.juniper.net/JSA11162"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series"
          ],
          "product": "Junos OS",
          "vendor": "Juniper Networks",
          "versions": [
            {
              "lessThan": "12.3R12-S17",
              "status": "affected",
              "version": "12.3",
              "versionType": "custom"
            },
            {
              "lessThan": "15.1R7-S8",
              "status": "affected",
              "version": "15.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-04-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of the crafted ARP packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series. 12.3 versions prior to 12.3R12-S17; 15.1 versions prior to 15.1R7-S8. This issue only affects the listed Marvell-chipset based EX Series devices. No other products or platforms are affected."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-415",
              "description": "CWE-415 Double Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-22T19:37:26",
        "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
        "shortName": "juniper"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://kb.juniper.net/JSA11162"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The following software releases have been updated to resolve this specific issue: Junos OS: 12.3R12-S17, 15.1R7-S8, and all subsequent releases."
        }
      ],
      "source": {
        "advisory": "JSA11162",
        "defect": [
          "1497768"
        ],
        "discovery": "USER"
      },
      "title": "Junos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core.",
      "workarounds": [
        {
          "lang": "en",
          "value": "There are no known workarounds for this issue."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "sirt@juniper.net",
          "DATE_PUBLIC": "2021-04-14T16:00:00.000Z",
          "ID": "CVE-2021-0271",
          "STATE": "PUBLIC",
          "TITLE": "Junos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core."
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Junos OS",
                      "version": {
                        "version_data": [
                          {
                            "platform": "EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series",
                            "version_affected": "\u003c",
                            "version_name": "12.3",
                            "version_value": "12.3R12-S17"
                          },
                          {
                            "platform": "EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series",
                            "version_affected": "\u003c",
                            "version_name": "15.1",
                            "version_value": "15.1R7-S8"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Juniper Networks"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of the crafted ARP packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series. 12.3 versions prior to 12.3R12-S17; 15.1 versions prior to 15.1R7-S8. This issue only affects the listed Marvell-chipset based EX Series devices. No other products or platforms are affected."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
          }
        ],
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service (DoS)"
                }
              ]
            },
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-415 Double Free"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://kb.juniper.net/JSA11162",
              "refsource": "MISC",
              "url": "https://kb.juniper.net/JSA11162"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "The following software releases have been updated to resolve this specific issue: Junos OS: 12.3R12-S17, 15.1R7-S8, and all subsequent releases."
          }
        ],
        "source": {
          "advisory": "JSA11162",
          "defect": [
            "1497768"
          ],
          "discovery": "USER"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "There are no known workarounds for this issue."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
    "assignerShortName": "juniper",
    "cveId": "CVE-2021-0271",
    "datePublished": "2021-04-22T19:37:27.039777Z",
    "dateReserved": "2020-10-27T00:00:00",
    "dateUpdated": "2024-09-16T16:59:14.748Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-0271\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2021-04-22T20:15:10.053\",\"lastModified\":\"2021-07-23T19:11:26.507\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Double Free vulnerability in the software forwarding interface daemon (sfid) process of Juniper Networks Junos OS allows an adjacently-connected attacker to cause a Denial of Service (DoS) by sending a crafted ARP packet to the device. Continued receipt and processing of the crafted ARP packets will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series. 12.3 versions prior to 12.3R12-S17; 15.1 versions prior to 15.1R7-S8. This issue only affects the listed Marvell-chipset based EX Series devices. No other products or platforms are affected.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Doble Liberaci\u00f3n en el proceso software forwarding interface daemon (sfid) de Juniper Networks Junos OS, permite a un atacante conectado de forma adyacente causar una Denegaci\u00f3n de Servicio (DoS) mediante el env\u00edo de un paquete ARP dise\u00f1ado hacia el dispositivo.\u0026#xa0;La recepci\u00f3n y el procesamiento continuo de los paquetes ARP dise\u00f1ados crear\u00e1n una condici\u00f3n sostenida de Denegaci\u00f3n de Servicio (DoS).\u0026#xa0;Este problema afecta a: Juniper Networks Junos OS en Serie EX2200-C, Serie EX3200, Serie EX3300, Serie EX4200, Serie EX4500, Serie EX4550, Serie EX6210, Serie EX8208, Serie EX8216.\u0026#xa0;versiones 12.3 anteriores a 12.3R12-S17;\u0026#xa0;versiones 15.1 anteriores a 15.1R7-S8.\u0026#xa0;Este problema solo afecta a los dispositivos de la serie EX basados ??en chipset Marvell enumerados.\u0026#xa0;Ning\u00fan otro producto o plataforma est\u00e1 afectado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":3.3},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]},{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"223C12D0-61A0-4C12-8AFC-A0CB64759A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"371A7DF8-3F4B-439D-8990-D1BC6F0C25C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r10:*:*:*:*:*:*\",\"matchCriteriaId\":\"661B4C1E-DB85-4EB0-B26F-F6496CEF0AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r10-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7C33DE7-4947-41D1-8DDF-DC7C9541414E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r10-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12D5D63-479D-4B27-8179-3B8985DB51F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0DD051A-E486-4A9D-A978-A5A980AAF237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4ED9ACC-B6BA-4128-8934-759BB9EC904F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC4D8EE5-E93F-4F50-9D31-CD5A69531962\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s10:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63EF1C6-C859-4EFA-81BE-1E5AD3364B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B786F950-0E07-4ADC-B988-917994FE99CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s12:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F703D05-C7A4-4EBF-A2FB-8AFE8E13DCDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s13:*:*:*:*:*:*\",\"matchCriteriaId\":\"BACE640C-9ED9-4976-9083-DEEBDDAA5516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s14:*:*:*:*:*:*\",\"matchCriteriaId\":\"9813A1FF-9AB3-46C0-BD65-5462E2942FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s15:*:*:*:*:*:*\",\"matchCriteriaId\":\"564E4FA2-671F-4762-979F-4B8C93275412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s16:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C75780-930E-4263-9418-44682237EA19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C8DC55-60AF-44D0-86C1-1F90C5DB0235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D23CEC9A-BF5F-489C-8CA7-1946238E20D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s6:*:*:*:*:*:*\",\"matchCriteriaId\":\"0010CCA3-6A76-4C18-82C4-BF44FECA4B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:12.3:r12-s8:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D353E7F-F773-4502-B4EE-E73BA2DE1BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"285CD1E5-C6D3-470A-8556-653AFF74D0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"83AB8877-3DC0-4B8C-B864-1BF18C368337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80CABB3-9A32-4FBC-AB8E-435BA85CFA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56F5C48-BA48-4EE1-88BE-782B3CFB3B90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C56E6C3-BBB6-4853-91D9-99C7676D0CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC196685-3B0C-4754-AE6A-6BE456CC6B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0146AA9-C513-4871-A62A-52C9F40EB958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18672EF-E33D-4ACE-BB0A-561812F502C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF0E75F-831E-40B8-926D-B2E92A84E31B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E0ECBD8-3D66-49DA-A557-5695159F0C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAA2998-A0D6-4818-9E7C-25E8099403E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D4ADFC5-D4B8-4A68-95D8-8ADF92C1CFE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFF0C559-EC2F-4FEE-B012-E9127A68FD4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D211B9-B2FE-4324-AAEE-8825D5238E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD3A11C-4CAA-4DDB-AD20-6C7EFA368CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9134BF-7289-4503-A9C5-977C4CDCD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*\",\"matchCriteriaId\":\"2698D906-6D9D-429C-9ECC-46FF2334C637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6126279A-8509-4CA1-BFB3-E76F701F5031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA0D028E-0B07-4CB2-863A-527806B9917C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"846582E4-05A0-4AD9-B78B-1707A09DAA74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43A39D8-3BD4-41CD-A8A3-2BFF8D340BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECD665D-2CA4-4CB2-B77D-9230B102B339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B83ED7-EE50-4F06-A386-B0A4FC7263DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F1FD18-AAD2-48DD-8F23-55D65D34FCE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02FED8D-A554-4039-9F0A-C7EEFC640317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD332D86-5DA7-49A4-98C3-E4D946832DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BFFAC38-5D41-4BDB-B9D4-579F104A61BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E6CD065-EC06-4846-BD2A-D3CA7866070F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7620D01-1A6B-490F-857E-0D803E0AEE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1545CE-279F-4EE2-8913-8F3B2FAFE7F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B09A78-9DEA-43A7-8DD6-56D94869DAEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B1A6D6-EB40-461A-87B0-FD777019E1BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8CD62D3-0894-426E-80A8-CEBCBD49810F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"08FC0245-A4FF-42C0-A236-8569301E351A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A68E7711-C7B9-4578-AB7B-863F088A38BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0501706-CB27-42B6-916B-B0009EC333C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E43503-A694-406E-B95A-689E4167A4FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A464B371-1B8B-4563-8728-969825896115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"120EA9E3-788B-4CFD-A74F-17111FFD0131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B4C2FBB-FEA0-4B98-8568-705FFFFFBB06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2506FCC-4B0F-4FEF-A44E-0C704B6217F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D9F2F31-B378-40FE-B012-000A225B76F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D014FF7B-BBEA-4F80-BE0E-4C70E4585A1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8257676-7AA7-4B39-A8F8-685843D0685B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"31001EA8-2C65-4D3D-AEC7-F298692E8752\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A3ECF9-AA4D-41F9-8441-1EB5F1DB882E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*\",\"matchCriteriaId\":\"989D1170-C430-4117-8E3B-46D8B459DF49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2FD851-BBB6-4D29-B933-1070564E0B50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5229750A-8555-4A4F-AD6C-82400BE81E1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5646AB3-407E-4745-8B16-4B58A8961D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61247C5-C611-47CE-89BA-AB3958A975B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9DB8A3-2E5F-4969-9D42-25363489A133\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7BD5636-93D5-4C06-964F-00055DF6B2B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C7A20FC-A19F-4881-A0E8-C440E9FE60D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC326549-217D-4194-8310-AB398D6FF3F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53269C69-3D1E-4F05-8EF6-81743D7A699E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDEE8AE4-B393-442C-AD68-4AC43E76A8F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E98077-92AF-4E3E-96F0-2E6F9D6343D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FF88C7-89CB-4E04-BADA-AD64F8060C6C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E67A5A-0DFF-42D9-81A7-570E9BCA463D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B51C5371-51E9-40AE-8619-BC1267DD1D08\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA11162\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.