CVE-2021-0226
22.04.2021, 20:15
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue does not affect IPv4 BGP sessions. This issue affects IBGP or EBGP peer sessions with IPv6. This issue affects: Juniper Networks Junos OS Evolved: 19.4 versions prior to 19.4R2-S3-EVO; 20.1 versions prior to 20.1R2-S3-EVO; 20.2 versions prior to 20.2R2-S1-EVO; 20.3 versions prior to 20.3R2-EVO. This issue does not affect Juniper Networks Junos OS releases.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos_os_evolved | 20.1:r1 |
juniper | junos_os_evolved | 20.1:r1-s1 |
juniper | junos_os_evolved | 20.1:r2 |
juniper | junos_os_evolved | 20.1:r2-s1 |
juniper | junos_os_evolved | 20.1:r2-s2 |
juniper | junos_os_evolved | 20.2:r1 |
juniper | junos_os_evolved | 20.2:r1-s1 |
juniper | junos_os_evolved | 20.2:r2 |
juniper | junos_os_evolved | 20.3:r1 |
juniper | junos_os_evolved | 20.3:r1-s1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration