Vulnerability Name:

CVE-2021-0292 (CCN-205440)

Assigned:2020-10-27
Published:2021-07-14
Updated:2021-10-25
Summary:An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition. Link-layer functions such as IPv4 and/or IPv6 address resolution may be impacted, leading to traffic loss. The processes do not recover on their own and must be manually restarted. Changes in memory usage can be monitored using the following shell commands (header shown for clarity): user@router:/var/log# ps aux | grep arpd USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 31418 59.0 0.7 *5702564* 247952 ? xxx /usr/sbin/arpd --app-name arpd -I object_select --shared-objects-mode 3 user@router:/var/log# ps aux | grep arpd USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 31418 49.1 1.0 *5813156* 351184 ? xxx /usr/sbin/arpd --app-name arpd -I object_select --shared-objects-mode 3 Memory usage can be monitored for the ndp process in a similar fashion: user@router:/var/log# ps aux | grep ndp USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 14935 0.0 0.1 *5614052* 27256 ? Ssl Jun15 0:17 /usr/sbin/ndp -I no_tab_chk,object_select --app-name ndp --shared-obje user@router:/var/log# ps aux | grep ndp USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND root 14935 0.0 0.1 *5725164* 27256 ? Ssl Jun15 0:17 /usr/sbin/ndp -I no_tab_chk,object_select --app-name ndp --shared-obje This issue affects Juniper Networks Junos OS Evolved: 19.4 versions prior to 19.4R2-S3-EVO; 20.1 versions prior to 20.1R2-S4-EVO; all versions of 20.2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 19.4R2-EVO.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
6.1 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-400
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-0292

Source: XF
Type: UNKNOWN
juniper-cve20210292-dos(205440)

Source: CCN
Type: Juniper Networks Security Bulletin JSA11194
Junos OS Evolved: Memory leak in arpd or ndp processes can lead to Denial of Service (DoS) (CVE-2021-0292)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA11194

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.4:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.4:r2-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.4:r2-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r2-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r2-s2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r2-s3:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.2:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos_evolved:19.4:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_evolved:20.1:-:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_evolved:20.2:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos os evolved 19.4 r1
    juniper junos os evolved 19.4 r2
    juniper junos os evolved 19.4 r2-s1
    juniper junos os evolved 19.4 r2-s2
    juniper junos os evolved 20.1 -
    juniper junos os evolved 20.1 r1
    juniper junos os evolved 20.1 r1-s1
    juniper junos os evolved 20.1 r2
    juniper junos os evolved 20.1 r2-s1
    juniper junos os evolved 20.1 r2-s2
    juniper junos os evolved 20.1 r2-s3
    juniper junos os evolved 20.2 -
    juniper junos evolved 19.4 r1
    juniper junos evolved 20.1 -
    juniper junos evolved 20.2 -