CVE-2021-31351

An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects specific versions of Juniper Networks Junos OS on MX Series: 17.3R3-S11; 17.4R2-S13; 17.4R3 prior to 17.4R3-S5; 18.1R3-S12; 18.2R2-S8, 18.2R3-S7, 18.2R3-S8; 18.3R3-S4; 18.4R3-S7; 19.1R3-S4, 19.1R3-S5; 19.2R1-S6; 19.3R3-S2; 19.4R2-S4, 19.4R2-S5; 19.4R3-S2; 20.1R2-S1; 20.2R2-S2, 20.2R2-S3, 20.2R3; 20.3R2, 20.3R2-S1; 20.4R1, 20.4R1-S1, 20.4R2; 21.1R1; This issue does not affect any version of Juniper Networks Junos OS prior to 15.1X49-D240;
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
VendorProductVersion
juniperjunos
17.3:r3-s11
juniperjunos
17.4:r2-s13
juniperjunos
17.4:r3
juniperjunos
17.4:r3-s1
juniperjunos
17.4:r3-s2
juniperjunos
17.4:r3-s3
juniperjunos
17.4:r3-s4
juniperjunos
18.1:r3-s12
juniperjunos
18.2:r2-s8
juniperjunos
18.2:r3-s7
juniperjunos
18.2:r3-s8
juniperjunos
18.3:r3-s4
juniperjunos
18.4:r3-s7
juniperjunos
19.1:r3-s4
juniperjunos
19.1:r3-s5
juniperjunos
19.2:r1-s6
juniperjunos
19.3:r3-s2
juniperjunos
19.4:r2-s4
juniperjunos
19.4:r2-s5
juniperjunos
19.4:r3-s2
juniperjunos
20.1:r2-s1
juniperjunos
20.2:r2-s2
juniperjunos
20.2:r2-s3
juniperjunos
20.2:r3
juniperjunos
20.3:r2
juniperjunos
20.3:r2-s1
juniperjunos
20.4:r1
juniperjunos
20.4:r1-s1
juniperjunos
20.4:r2
juniperjunos
21.1:r1
𝑥
= Vulnerable software versions