First published: Wed Apr 14 2021(Updated: )
In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations within the packet forwarding engine (PFE) to crash and restart, leading to a Denial of Service (DoS) condition. By continuously sending this specific stream of genuine Layer 2 frames, an attacker can repeatedly crash the PFE, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R1-EVO. This issue does not affect Junos OS versions.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Os Evolved | =20.4-r1 |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved: 20.4R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-0239 is a vulnerability in Juniper Networks Junos OS Evolved that can cause the Advanced Forwarding Toolkit (AFT) manager process to crash.
The severity of CVE-2021-0239 is medium, with a CVSS score of 6.5.
CVE-2021-0239 can cause the Advanced Forwarding Toolkit (AFT) manager process in Juniper Junos OS Evolved to crash.
Yes, a fix is available for CVE-2021-0239. Please refer to the Juniper Networks knowledge base article for more information.
You can find more information about CVE-2021-0239 in the Juniper Networks knowledge base article linked in the references.