Vulnerability Name:

CVE-2021-0297 (CCN-211258)

Assigned:2020-10-27
Published:2021-10-13
Updated:2021-10-25
Summary:A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled. This could lead to untrusted or unauthorized sessions being established, resulting in an impact on confidentiality or stability of the network. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.3R2-S1-EVO; 20.4 versions prior to 20.4R2-EVO; 21.1 versions prior to 21.1R2-EVO. Juniper Networks Junos OS is not affected by this issue.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-755
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-0297

Source: XF
Type: UNKNOWN
juniper-cve20210297-sec-bypass(211258)

Source: CCN
Type: Juniper Networks Security Bulletin JSA11211
Junos OS Evolved: BGP and LDP sessions with TCP MD5 authentication established with peers not configured for authentication (CVE-2021-0297)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA11211

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.3:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.3:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:21.1:r1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos_evolved:19.2:r1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos os evolved 20.3 r1
    juniper junos os evolved 20.3 r1-s1
    juniper junos os evolved 20.3 r2
    juniper junos os evolved 20.4 r1
    juniper junos os evolved 21.1 r1
    juniper junos evolved 19.2 r1