Vulnerability Name:

CVE-2021-0298 (CCN-211259)

Assigned:2020-10-27
Published:2021-10-13
Updated:2021-10-25
Summary:A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside the attacker's control, leading to a Denial of Service (DoS) condition. Continued execution of the CLI command, under precise conditions, could create a sustained Denial of Service (DoS) condition. This issue affects all Juniper Networks Junos OS Evolved versions prior to 20.1R2-EVO on PTX10003 and PTX10008 platforms. Junos OS is not affected by this vulnerability.
CVSS v3 Severity:4.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)
4.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
4.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)
4.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
3.8 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-362
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2021-0298

Source: XF
Type: UNKNOWN
juniper-cve20210298-dos(211259)

Source: CCN
Type: Juniper Networks Security Bulletin JSA11212
Junos OS Evolved: PTX10003, PTX10008: picd core while executing the show chassis pic command under certain conditions (CVE-2021-0298)

Source: CONFIRM
Type: Vendor Advisory
https://kb.juniper.net/JSA11212

Vulnerable Configuration:Configuration 1:
  • cpe:/o:juniper:junos_os_evolved:18.3:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.1:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.1:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.2:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.2:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.3:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.3:r2:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:19.4:r1-s1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*
  • AND
  • cpe:/h:juniper:ptx10003:-:*:*:*:*:*:*:*
  • OR cpe:/h:juniper:ptx10008:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:juniper:junos_evolved:19.2:r1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    juniper junos os evolved 18.3 r1
    juniper junos os evolved 19.1 r1
    juniper junos os evolved 19.1 r2
    juniper junos os evolved 19.2 r1
    juniper junos os evolved 19.2 r2
    juniper junos os evolved 19.3 r1
    juniper junos os evolved 19.3 r2
    juniper junos os evolved 19.4 r1
    juniper junos os evolved 19.4 r1-s1
    juniper junos os evolved 20.1 r1
    juniper junos os evolved 20.1 r1-s1
    juniper ptx10003 -
    juniper ptx10008 -
    juniper junos evolved 19.2 r1