Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-31352 (GCVE-0-2021-31352)
Vulnerability from cvelistv5 – Published: 2021-10-19 18:16 – Updated: 2024-09-16 19:20- CWE-200 - Information Exposure
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Juniper Networks | SRC Series |
Affected:
unspecified , < 4.13.0-R6
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:55:53.552Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/JSA11217"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SRC Series",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "4.13.0-R6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "A sample configuration of NETCONF over SSH is shown below:\n\n netconf {\n ssh {\n port 830;\n }\n }"
}
],
"datePublic": "2021-10-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6."
}
],
"exploits": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Information Exposure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-19T18:16:33",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/JSA11217"
}
],
"solutions": [
{
"lang": "en",
"value": "A hotfix has been created to resolve this issue. Contact Juniper Networks Technical Support to request the hotfix.\n\nWeak ciphers are now disabled by default. Only the following ciphers and key-exchange (KEX) algorithms are now enabled by default:\n\n\u2022 Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com\n\u2022 KEX Algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1\n\nNote: After upgrading to a fixed release, any manually configured weak ciphers or KEX algorithms for NETCONF will be retained. Administrators should reset their cipher configuration by typing:\n root@src# delete system services netconf ssh\n root@src# commit\n Stopping NETCONF/SSH:\n commit complete.\n\n root@src# set system services netconf ssh"
}
],
"source": {
"advisory": "JSA11217",
"defect": [
"1568322"
],
"discovery": "INTERNAL"
},
"title": "SRC Series: NETCONF over SSH allows negotiation of weak ciphers",
"workarounds": [
{
"lang": "en",
"value": "There are no viable workarounds for this issue."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2021-10-13T16:00:00.000Z",
"ID": "CVE-2021-31352",
"STATE": "PUBLIC",
"TITLE": "SRC Series: NETCONF over SSH allows negotiation of weak ciphers"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SRC Series",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "4.13.0-R6"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"configuration": [
{
"lang": "en",
"value": "A sample configuration of NETCONF over SSH is shown below:\n\n netconf {\n ssh {\n port 830;\n }\n }"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6."
}
]
},
"exploit": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Information Exposure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA11217",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA11217"
}
]
},
"solution": [
{
"lang": "en",
"value": "A hotfix has been created to resolve this issue. Contact Juniper Networks Technical Support to request the hotfix.\n\nWeak ciphers are now disabled by default. Only the following ciphers and key-exchange (KEX) algorithms are now enabled by default:\n\n\u2022 Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com\n\u2022 KEX Algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1\n\nNote: After upgrading to a fixed release, any manually configured weak ciphers or KEX algorithms for NETCONF will be retained. Administrators should reset their cipher configuration by typing:\n root@src# delete system services netconf ssh\n root@src# commit\n Stopping NETCONF/SSH:\n commit complete.\n\n root@src# set system services netconf ssh"
}
],
"source": {
"advisory": "JSA11217",
"defect": [
"1568322"
],
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "There are no viable workarounds for this issue."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2021-31352",
"datePublished": "2021-10-19T18:16:33.308361Z",
"dateReserved": "2021-04-15T00:00:00",
"dateUpdated": "2024-09-16T19:20:18.621Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:juniper:session_and_resource_control:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.130r6\", \"matchCriteriaId\": \"F859871E-2194-4F8D-8978-26A032CF77D1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de exposici\\u00f3n de informaci\\u00f3n en los dispositivos de Juniper Networks SRC Series configurados para NETCONF sobre SSH permite una negociaci\\u00f3n de cifrados d\\u00e9biles, lo que podr\\u00eda permitir a un atacante remoto conseguir informaci\\u00f3n confidencial. Un atacante remoto con acceso de lectura y escritura a los datos de la red podr\\u00eda aprovechar esta vulnerabilidad para mostrar bits de texto plano de un bloque de texto cifrado y conseguir informaci\\u00f3n confidencial. Este problema afecta a todas las versiones de Juniper Networks SRC Series anteriores a 4.13.0-R6\"}]",
"id": "CVE-2021-31352",
"lastModified": "2024-11-21T06:05:28.883",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-10-19T19:15:08.660",
"references": "[{\"url\": \"https://kb.juniper.net/JSA11217\", \"source\": \"sirt@juniper.net\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://kb.juniper.net/JSA11217\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"sirt@juniper.net\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-327\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-31352\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2021-10-19T19:15:08.660\",\"lastModified\":\"2024-11-21T06:05:28.883\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de exposici\u00f3n de informaci\u00f3n en los dispositivos de Juniper Networks SRC Series configurados para NETCONF sobre SSH permite una negociaci\u00f3n de cifrados d\u00e9biles, lo que podr\u00eda permitir a un atacante remoto conseguir informaci\u00f3n confidencial. Un atacante remoto con acceso de lectura y escritura a los datos de la red podr\u00eda aprovechar esta vulnerabilidad para mostrar bits de texto plano de un bloque de texto cifrado y conseguir informaci\u00f3n confidencial. Este problema afecta a todas las versiones de Juniper Networks SRC Series anteriores a 4.13.0-R6\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:session_and_resource_control:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.130r6\",\"matchCriteriaId\":\"F859871E-2194-4F8D-8978-26A032CF77D1\"}]}]}],\"references\":[{\"url\":\"https://kb.juniper.net/JSA11217\",\"source\":\"sirt@juniper.net\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://kb.juniper.net/JSA11217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2021-AVI-789
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks CTPView versions 9.1 antérieures à 9.1R3 | ||
| Juniper Networks | N/A | Juniper Networks SRC Series versions antérieures à 4.13.0-R6 | ||
| Juniper Networks | N/A | Juniper Networks CTPView versions 7.3 antérieures à 7.3R7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.4 antérieures à 19.4R1-S4, 19.4R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.4 antérieures à 19.4R2-S3, 19.4R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 17.4 antérieures à 17.4R2-S13, 17.4R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.2R3-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.4R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 18.4 antérieures à 18.4R3-S9 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.1 antérieures à 19.1R1-S6, 19.1R2-S2, 19.1R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.1 antérieures à 19.1R3-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 12.3X48 antérieures à 12.3X48-D105 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 17.4 antérieures à 17.4R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.3 antérieures à 20.3R2-S1, 20.3R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 21.1R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.2 antérieures à 19.2R1-S7, 19.2R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 15.1 antérieures à 15.1R7-S10 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions antérieures à 18.4R3-S9 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.1 antérieures à 20.1R2-S2, 20.1R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.1 antérieures à 19.1R3-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.3R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 18.4R3-S8 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.3 antérieures à 18.3R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 20.3 antérieures à 20.3R1-S1, 20.3R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.2R1-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 21.1R1-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 17.4R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.1 antérieures à 18.1R3-S12 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 18.1R3-S13 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 18.3R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.2 antérieures à 18.2R2-S8, 18.2R3-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.4 antérieures à 19.4R3-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.3R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.4 antérieures à 20.4R2-S1, 20.4R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.2 antérieures à 20.2R3-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 17.3R3-S12 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.3 antérieures à 19.3R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.1R3-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.3 antérieures à 20.3R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 21.2R1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.4 antérieures à 18.4R1-S8, 18.4R2-S7, 18.4R3-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.2 antérieures à 19.2R1-S6, 19.2R3-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.2 antérieures à 20.2R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 15.1X49 antérieures à 15.1X49-D220 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 21.1 antérieures à 21.1R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.4 antérieures à 20.4R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.3 antérieures à 19.3R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.3R2-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.1R2-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 20.1 antérieures à 20.1R2, 20.1R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 20.2 antérieures à 20.2R2, 20.2R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions antérieures à 17.3R3-S11 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.4R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.3 antérieures à 19.3R2-S6, 19.3R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.2R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.1R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions antérieures à 18.2R3-S8 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.2 antérieures à 19.2R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 21.1 antérieures à 21.1R1-S1, 21.1R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.1 antérieures à 20.1R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 18.3 antérieures à 18.3R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.4R2-S1 | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 21.2-EVO antérieures à 21.2R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions antérieures à 20.1R2-EVO sur PTX10003 et PTX10008 platforms | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved toutes versions 21.1-EVO et 21.2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions antérieures à 21.2R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 21.1 antérieures à 21.1R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 20.4 antérieures à 20.4R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 20.3 antérieures à 20.3R1-S2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 21.1-EVO antérieures à 21.1R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions antérieures à 20.4R3-S1-EVO |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks CTPView versions 9.1 ant\u00e9rieures \u00e0 9.1R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks SRC Series versions ant\u00e9rieures \u00e0 4.13.0-R6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks CTPView versions 7.3 ant\u00e9rieures \u00e0 7.3R7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.4 ant\u00e9rieures \u00e0 19.4R1-S4, 19.4R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.4 ant\u00e9rieures \u00e0 19.4R2-S3, 19.4R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 17.4 ant\u00e9rieures \u00e0 17.4R2-S13, 17.4R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.2R3-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.4R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 18.4 ant\u00e9rieures \u00e0 18.4R3-S9",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.1 ant\u00e9rieures \u00e0 19.1R1-S6, 19.1R2-S2, 19.1R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D105",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 17.4 ant\u00e9rieures \u00e0 17.4R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.3 ant\u00e9rieures \u00e0 20.3R2-S1, 20.3R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.1R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S7, 19.2R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R7-S10",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions ant\u00e9rieures \u00e0 18.4R3-S9",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.1 ant\u00e9rieures \u00e0 20.1R2-S2, 20.1R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.3R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 18.4R3-S8",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.3 ant\u00e9rieures \u00e0 18.3R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 20.3 ant\u00e9rieures \u00e0 20.3R1-S1, 20.3R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.2R1-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.1R1-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 17.4R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.1 ant\u00e9rieures \u00e0 18.1R3-S12",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 18.1R3-S13",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 18.3R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.2 ant\u00e9rieures \u00e0 18.2R2-S8, 18.2R3-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.3R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.4 ant\u00e9rieures \u00e0 20.4R2-S1, 20.4R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 17.3R3-S12",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.1R3-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.3 ant\u00e9rieures \u00e0 20.3R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.4 ant\u00e9rieures \u00e0 18.4R1-S8, 18.4R2-S7, 18.4R3-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S6, 19.2R3-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D220",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 21.1 ant\u00e9rieures \u00e0 21.1R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.4 ant\u00e9rieures \u00e0 20.4R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.3R2-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.1R2-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 20.1 ant\u00e9rieures \u00e0 20.1R2, 20.1R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 20.2 ant\u00e9rieures \u00e0 20.2R2, 20.2R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions ant\u00e9rieures \u00e0 17.3R3-S11",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.4R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.3 ant\u00e9rieures \u00e0 19.3R2-S6, 19.3R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.2R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.1R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions ant\u00e9rieures \u00e0 18.2R3-S8",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.2 ant\u00e9rieures \u00e0 19.2R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 21.1 ant\u00e9rieures \u00e0 21.1R1-S1, 21.1R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 18.3 ant\u00e9rieures \u00e0 18.3R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.4R2-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions ant\u00e9rieures \u00e0 20.1R2-EVO sur PTX10003 et PTX10008 platforms",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved toutes versions 21.1-EVO et 21.2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 21.1 ant\u00e9rieures \u00e0 21.1R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 20.4 ant\u00e9rieures \u00e0 20.4R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 20.3 ant\u00e9rieures \u00e0 20.3R1-S2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 21.1-EVO ant\u00e9rieures \u00e0 21.1R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S1-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0296"
},
{
"name": "CVE-2021-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31356"
},
{
"name": "CVE-2021-31363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31363"
},
{
"name": "CVE-2021-0299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0299"
},
{
"name": "CVE-2021-31360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31360"
},
{
"name": "CVE-2021-31355",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31355"
},
{
"name": "CVE-2021-31353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31353"
},
{
"name": "CVE-2021-31354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31354"
},
{
"name": "CVE-2021-0298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0298"
},
{
"name": "CVE-2021-31361",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31361"
},
{
"name": "CVE-2021-31362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31362"
},
{
"name": "CVE-2021-31359",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31359"
},
{
"name": "CVE-2021-31350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31350"
},
{
"name": "CVE-2021-31351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31351"
},
{
"name": "CVE-2021-31357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31357"
},
{
"name": "CVE-2021-31358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31358"
},
{
"name": "CVE-2021-0297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0297"
},
{
"name": "CVE-2021-31352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31352"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-789",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11224 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11224\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11221 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11221\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11218 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11218\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11213 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11213\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11210 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11210\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11212 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11212\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11223 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11223\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11225 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11225\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11219 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11219\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11222 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11222\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11215 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11215\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11220 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11220\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11211 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11211\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11217 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11217\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11216 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11216\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2021-AVI-789
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper Networks CTPView versions 9.1 antérieures à 9.1R3 | ||
| Juniper Networks | N/A | Juniper Networks SRC Series versions antérieures à 4.13.0-R6 | ||
| Juniper Networks | N/A | Juniper Networks CTPView versions 7.3 antérieures à 7.3R7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.4 antérieures à 19.4R1-S4, 19.4R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.4 antérieures à 19.4R2-S3, 19.4R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 17.4 antérieures à 17.4R2-S13, 17.4R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.2R3-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.4R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 18.4 antérieures à 18.4R3-S9 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.1 antérieures à 19.1R1-S6, 19.1R2-S2, 19.1R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.1 antérieures à 19.1R3-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 12.3X48 antérieures à 12.3X48-D105 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 17.4 antérieures à 17.4R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.3 antérieures à 20.3R2-S1, 20.3R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 21.1R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.2 antérieures à 19.2R1-S7, 19.2R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 15.1 antérieures à 15.1R7-S10 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions antérieures à 18.4R3-S9 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.1 antérieures à 20.1R2-S2, 20.1R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.1 antérieures à 19.1R3-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.3R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 18.4R3-S8 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.3 antérieures à 18.3R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 20.3 antérieures à 20.3R1-S1, 20.3R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.2R1-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 21.1R1-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 17.4R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.1 antérieures à 18.1R3-S12 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 18.1R3-S13 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 18.3R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.2 antérieures à 18.2R2-S8, 18.2R3-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.4 antérieures à 19.4R3-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.3R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.4 antérieures à 20.4R2-S1, 20.4R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.2 antérieures à 20.2R3-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 17.3R3-S12 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.3 antérieures à 19.3R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.1R3-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.3 antérieures à 20.3R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 21.2R1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 18.4 antérieures à 18.4R1-S8, 18.4R2-S7, 18.4R3-S7 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 19.2 antérieures à 19.2R1-S6, 19.2R3-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 20.2 antérieures à 20.2R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 15.1X49 antérieures à 15.1X49-D220 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 21.1 antérieures à 21.1R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.4 antérieures à 20.4R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.3 antérieures à 19.3R3-S4 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 19.3R2-S6 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.1R2-S2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 20.1 antérieures à 20.1R2, 20.1R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions 20.2 antérieures à 20.2R2, 20.2R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on QFX Series versions antérieures à 17.3R3-S11 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.4R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 19.3 antérieures à 19.3R2-S6, 19.3R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.2R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.1R3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions antérieures à 18.2R3-S8 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 19.2 antérieures à 19.2R3-S3 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on PTX Series versions 21.1 antérieures à 21.1R1-S1, 21.1R2 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 20.1 antérieures à 20.1R3-S1 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS versions 18.3 antérieures à 18.3R3-S5 | ||
| Juniper Networks | Networks Junos OS | Juniper Networks Junos OS on MX Series versions antérieures à 20.4R2-S1 | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 21.2-EVO antérieures à 21.2R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions antérieures à 20.1R2-EVO sur PTX10003 et PTX10008 platforms | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved toutes versions 21.1-EVO et 21.2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions antérieures à 21.2R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 21.1 antérieures à 21.1R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 20.4 antérieures à 20.4R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 20.3 antérieures à 20.3R1-S2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions 21.1-EVO antérieures à 21.1R2-EVO | ||
| Juniper Networks | Networks Junos OS Evolved | Juniper Networks Junos OS Evolved versions antérieures à 20.4R3-S1-EVO |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks CTPView versions 9.1 ant\u00e9rieures \u00e0 9.1R3",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks SRC Series versions ant\u00e9rieures \u00e0 4.13.0-R6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks CTPView versions 7.3 ant\u00e9rieures \u00e0 7.3R7",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.4 ant\u00e9rieures \u00e0 19.4R1-S4, 19.4R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.4 ant\u00e9rieures \u00e0 19.4R2-S3, 19.4R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 17.4 ant\u00e9rieures \u00e0 17.4R2-S13, 17.4R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.2R3-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.4R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 18.4 ant\u00e9rieures \u00e0 18.4R3-S9",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.1 ant\u00e9rieures \u00e0 19.1R1-S6, 19.1R2-S2, 19.1R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D105",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 17.4 ant\u00e9rieures \u00e0 17.4R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.3 ant\u00e9rieures \u00e0 20.3R2-S1, 20.3R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.1R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S7, 19.2R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R7-S10",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions ant\u00e9rieures \u00e0 18.4R3-S9",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.1 ant\u00e9rieures \u00e0 20.1R2-S2, 20.1R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.1 ant\u00e9rieures \u00e0 19.1R3-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.3R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 18.4R3-S8",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.3 ant\u00e9rieures \u00e0 18.3R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 20.3 ant\u00e9rieures \u00e0 20.3R1-S1, 20.3R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.2R1-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.1R1-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 17.4R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.1 ant\u00e9rieures \u00e0 18.1R3-S12",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 18.1R3-S13",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 18.3R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.2 ant\u00e9rieures \u00e0 18.2R2-S8, 18.2R3-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.4 ant\u00e9rieures \u00e0 19.4R3-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.3R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.4 ant\u00e9rieures \u00e0 20.4R2-S1, 20.4R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 17.3R3-S12",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.1R3-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.3 ant\u00e9rieures \u00e0 20.3R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 18.4 ant\u00e9rieures \u00e0 18.4R1-S8, 18.4R2-S7, 18.4R3-S7",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 19.2 ant\u00e9rieures \u00e0 19.2R1-S6, 19.2R3-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 20.2 ant\u00e9rieures \u00e0 20.2R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D220",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 21.1 ant\u00e9rieures \u00e0 21.1R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.4 ant\u00e9rieures \u00e0 20.4R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.3 ant\u00e9rieures \u00e0 19.3R3-S4",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 19.3R2-S6",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.1R2-S2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 20.1 ant\u00e9rieures \u00e0 20.1R2, 20.1R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions 20.2 ant\u00e9rieures \u00e0 20.2R2, 20.2R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on QFX Series versions ant\u00e9rieures \u00e0 17.3R3-S11",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.4R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 19.3 ant\u00e9rieures \u00e0 19.3R2-S6, 19.3R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.2R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.1R3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions ant\u00e9rieures \u00e0 18.2R3-S8",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 19.2 ant\u00e9rieures \u00e0 19.2R3-S3",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on PTX Series versions 21.1 ant\u00e9rieures \u00e0 21.1R1-S1, 21.1R2",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 20.1 ant\u00e9rieures \u00e0 20.1R3-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS versions 18.3 ant\u00e9rieures \u00e0 18.3R3-S5",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS on MX Series versions ant\u00e9rieures \u00e0 20.4R2-S1",
"product": {
"name": "Networks Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions ant\u00e9rieures \u00e0 20.1R2-EVO sur PTX10003 et PTX10008 platforms",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved toutes versions 21.1-EVO et 21.2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 21.1 ant\u00e9rieures \u00e0 21.1R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 20.4 ant\u00e9rieures \u00e0 20.4R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 20.3 ant\u00e9rieures \u00e0 20.3R1-S2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions 21.1-EVO ant\u00e9rieures \u00e0 21.1R2-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Networks Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S1-EVO",
"product": {
"name": "Networks Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0296",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0296"
},
{
"name": "CVE-2021-31356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31356"
},
{
"name": "CVE-2021-31363",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31363"
},
{
"name": "CVE-2021-0299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0299"
},
{
"name": "CVE-2021-31360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31360"
},
{
"name": "CVE-2021-31355",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31355"
},
{
"name": "CVE-2021-31353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31353"
},
{
"name": "CVE-2021-31354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31354"
},
{
"name": "CVE-2021-0298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0298"
},
{
"name": "CVE-2021-31361",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31361"
},
{
"name": "CVE-2021-31362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31362"
},
{
"name": "CVE-2021-31359",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31359"
},
{
"name": "CVE-2021-31350",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31350"
},
{
"name": "CVE-2021-31351",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31351"
},
{
"name": "CVE-2021-31357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31357"
},
{
"name": "CVE-2021-31358",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31358"
},
{
"name": "CVE-2021-0297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0297"
},
{
"name": "CVE-2021-31352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31352"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-789",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11224 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11224\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11221 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11221\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11218 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11218\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11213 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11213\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11210 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11210\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11212 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11212\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11223 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11223\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11225 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11225\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11219 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11219\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11222 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11222\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11215 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11215\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11220 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11220\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11211 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11211\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11217 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11217\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11216 du 14 octobre 2021",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11216\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
VAR-202110-0616
Vulnerability from variot - Updated: 2023-12-18 12:26An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202110-0616",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "session and resource control",
"scope": "lt",
"trust": 1.0,
"vendor": "juniper",
"version": "4.130r6"
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-31352"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.130r6",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-31352"
}
]
},
"cve": "CVE-2021-31352",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-391100",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "sirt@juniper.net",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2021-31352",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "sirt@juniper.net",
"id": "CVE-2021-31352",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202110-1009",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-391100",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-391100"
},
{
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"db": "VULHUB",
"id": "VHN-391100"
},
{
"db": "VULMON",
"id": "CVE-2021-31352"
}
],
"trust": 1.08
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JUNIPER",
"id": "JSA11217",
"trust": 1.8
},
{
"db": "NVD",
"id": "CVE-2021-31352",
"trust": 1.8
},
{
"db": "AUSCERT",
"id": "ESB-2021.3416",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021101404",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202110-1009",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-391100",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-31352",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-391100"
},
{
"db": "VULMON",
"id": "CVE-2021-31352"
},
{
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
]
},
"id": "VAR-202110-0616",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-391100"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:26:42.234000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Juniper Networks CtpView Repair measures for information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=165775"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-327",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-391100"
},
{
"db": "NVD",
"id": "CVE-2021-31352"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "https://kb.juniper.net/jsa11217"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021101404"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.3416"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-391100"
},
{
"db": "VULMON",
"id": "CVE-2021-31352"
},
{
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-391100"
},
{
"db": "VULMON",
"id": "CVE-2021-31352"
},
{
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-10-19T00:00:00",
"db": "VULHUB",
"id": "VHN-391100"
},
{
"date": "2021-10-19T00:00:00",
"db": "VULMON",
"id": "CVE-2021-31352"
},
{
"date": "2021-10-19T19:15:08.660000",
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"date": "2021-10-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-10-27T00:00:00",
"db": "VULHUB",
"id": "VHN-391100"
},
{
"date": "2021-10-19T00:00:00",
"db": "VULMON",
"id": "CVE-2021-31352"
},
{
"date": "2022-10-27T13:05:14.193000",
"db": "NVD",
"id": "CVE-2021-31352"
},
{
"date": "2022-10-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Juniper Networks SRX Series Encryption problem vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202110-1009"
}
],
"trust": 0.6
}
}
GSD-2021-31352
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-31352",
"description": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.",
"id": "GSD-2021-31352"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-31352"
],
"details": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.",
"id": "GSD-2021-31352",
"modified": "2023-12-13T01:23:13.648245Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2021-10-13T16:00:00.000Z",
"ID": "CVE-2021-31352",
"STATE": "PUBLIC",
"TITLE": "SRC Series: NETCONF over SSH allows negotiation of weak ciphers"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SRC Series",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "4.13.0-R6"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"configuration": [
{
"lang": "eng",
"value": "A sample configuration of NETCONF over SSH is shown below:\n\n netconf {\n ssh {\n port 830;\n }\n }\n "
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200 Information Exposure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA11217",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA11217"
}
]
},
"solution": [
{
"lang": "eng",
"value": "A hotfix has been created to resolve this issue. Contact Juniper Networks Technical Support to request the hotfix.\n\nWeak ciphers are now disabled by default. Only the following ciphers and key-exchange (KEX) algorithms are now enabled by default:\n\n\u2022 Ciphers: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com\n\u2022 KEX Algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1\n\nNote: After upgrading to a fixed release, any manually configured weak ciphers or KEX algorithms for NETCONF will be retained. Administrators should reset their cipher configuration by typing:\n root@src# delete system services netconf ssh\n root@src# commit\n Stopping NETCONF/SSH:\n commit complete.\n\n root@src# set system services netconf ssh\n"
}
],
"source": {
"advisory": "JSA11217",
"defect": [
"1568322"
],
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "eng",
"value": "There are no viable workarounds for this issue."
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:juniper:session_and_resource_control:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.130r6",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"ID": "CVE-2021-31352"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA11217",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA11217"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
},
"lastModifiedDate": "2022-10-27T13:05Z",
"publishedDate": "2021-10-19T19:15Z"
}
}
}
GHSA-PQ3V-R83J-PGG5
Vulnerability from github – Published: 2022-05-24 19:17 – Updated: 2022-10-27 19:00An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.
{
"affected": [],
"aliases": [
"CVE-2021-31352"
],
"database_specific": {
"cwe_ids": [
"CWE-200",
"CWE-327"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-10-19T19:15:00Z",
"severity": "MODERATE"
},
"details": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.",
"id": "GHSA-pq3v-r83j-pgg5",
"modified": "2022-10-27T19:00:38Z",
"published": "2022-05-24T19:17:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31352"
},
{
"type": "WEB",
"url": "https://kb.juniper.net/JSA11217"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2021-31352
Vulnerability from fkie_nvd - Published: 2021-10-19 19:15 - Updated: 2024-11-21 06:05| URL | Tags | ||
|---|---|---|---|
| sirt@juniper.net | https://kb.juniper.net/JSA11217 | Exploit, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA11217 | Exploit, Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | session_and_resource_control | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juniper:session_and_resource_control:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F859871E-2194-4F8D-8978-26A032CF77D1",
"versionEndExcluding": "4.130r6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6."
},
{
"lang": "es",
"value": "Una vulnerabilidad de exposici\u00f3n de informaci\u00f3n en los dispositivos de Juniper Networks SRC Series configurados para NETCONF sobre SSH permite una negociaci\u00f3n de cifrados d\u00e9biles, lo que podr\u00eda permitir a un atacante remoto conseguir informaci\u00f3n confidencial. Un atacante remoto con acceso de lectura y escritura a los datos de la red podr\u00eda aprovechar esta vulnerabilidad para mostrar bits de texto plano de un bloque de texto cifrado y conseguir informaci\u00f3n confidencial. Este problema afecta a todas las versiones de Juniper Networks SRC Series anteriores a 4.13.0-R6"
}
],
"id": "CVE-2021-31352",
"lastModified": "2024-11-21T06:05:28.883",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "sirt@juniper.net",
"type": "Secondary"
}
]
},
"published": "2021-10-19T19:15:08.660",
"references": [
{
"source": "sirt@juniper.net",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA11217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA11217"
}
],
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "sirt@juniper.net",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-327"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.