
22/4/2021

16/9/2024
CVE-2021-0249: Junos OS: SRX Series: A remote attacker may be able to cause a PFE buffer overflow to arbitrarily remotely execute code or commands on the target device with UTM enabled.
First published: Thu Apr 22 2021(Updated: )
On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwise impact the device by sending crafted packets to or through the device. This issue affects: Juniper Networks Junos OS on SRX Series: 15.1X49 versions prior to 15.1X49-D190; 17.4 versions prior to 17.4R2-S9; 17.4R3 and later versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3-S1; 18.3 versions prior to 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2. An indicator of compromise can be the following text in the UTM log: RT_UTM: AV_FILE_NOT_SCANNED_PASSED_MT:
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|
Juniper Junos | =15.1x49 | |
Juniper Junos | =15.1x49-d10 | |
Juniper Junos | =15.1x49-d100 | |
Juniper Junos | =15.1x49-d110 | |
Juniper Junos | =15.1x49-d120 | |
Juniper Junos | =15.1x49-d130 | |
Juniper Junos | =15.1x49-d131 | |
Juniper Junos | =15.1x49-d140 | |
Juniper Junos | =15.1x49-d15 | |
Juniper Junos | =15.1x49-d150 | |
Juniper Junos | =15.1x49-d160 | |
Juniper Junos | =15.1x49-d170 | |
Juniper Junos | =15.1x49-d180 | |
Juniper Junos | =15.1x49-d190 | |
Juniper Junos | =15.1x49-d20 | |
Juniper Junos | =15.1x49-d25 | |
Juniper Junos | =15.1x49-d30 | |
Juniper Junos | =15.1x49-d35 | |
Juniper Junos | =15.1x49-d40 | |
Juniper Junos | =15.1x49-d45 | |
Juniper Junos | =15.1x49-d50 | |
Juniper Junos | =15.1x49-d55 | |
Juniper Junos | =15.1x49-d60 | |
Juniper Junos | =15.1x49-d65 | |
Juniper Junos | =15.1x49-d70 | |
Juniper Junos | =15.1x49-d75 | |
Juniper Junos | =15.1x49-d80 | |
Juniper Junos | =15.1x49-d90 | |
Juniper Junos | =17.4 | |
Juniper Junos | =17.4-r1 | |
Juniper Junos | =17.4-r1-s1 | |
Juniper Junos | =17.4-r1-s2 | |
Juniper Junos | =17.4-r1-s3 | |
Juniper Junos | =17.4-r1-s4 | |
Juniper Junos | =17.4-r1-s5 | |
Juniper Junos | =17.4-r1-s6 | |
Juniper Junos | =17.4-r1-s7 | |
Juniper Junos | =17.4-r2 | |
Juniper Junos | =17.4-r2-s1 | |
Juniper Junos | =17.4-r2-s2 | |
Juniper Junos | =17.4-r2-s3 | |
Juniper Junos | =17.4-r2-s4 | |
Juniper Junos | =17.4-r2-s5 | |
Juniper Junos | =17.4-r2-s6 | |
Juniper Junos | =17.4-r2-s7 | |
Juniper Junos | =17.4-r2-s8 | |
Juniper Junos | =17.4-r3 | |
Juniper Junos | =17.4-r3-s1 | |
Juniper Junos | =17.4-r3-s2 | |
Juniper Junos | =17.4-r3-s3 | |
Juniper Junos | =17.4-r3-s4 | |
Juniper Junos | =18.1 | |
Juniper Junos | =18.1-r1 | |
Juniper Junos | =18.1-r2 | |
Juniper Junos | =18.1-r2-s1 | |
Juniper Junos | =18.1-r2-s2 | |
Juniper Junos | =18.1-r2-s4 | |
Juniper Junos | =18.1-r3 | |
Juniper Junos | =18.1-r3-s1 | |
Juniper Junos | =18.1-r3-s10 | |
Juniper Junos | =18.1-r3-s11 | |
Juniper Junos | =18.1-r3-s2 | |
Juniper Junos | =18.1-r3-s3 | |
Juniper Junos | =18.1-r3-s4 | |
Juniper Junos | =18.1-r3-s5 | |
Juniper Junos | =18.1-r3-s6 | |
Juniper Junos | =18.1-r3-s7 | |
Juniper Junos | =18.1-r3-s8 | |
Juniper Junos | =18.2 | |
Juniper Junos | =18.2-r1 | |
Juniper Junos | =18.2-r1 | |
Juniper Junos | =18.2-r1-s2 | |
Juniper Junos | =18.2-r1-s3 | |
Juniper Junos | =18.2-r1-s4 | |
Juniper Junos | =18.2-r1-s5 | |
Juniper Junos | =18.2-r2 | |
Juniper Junos | =18.2-r2-s1 | |
Juniper Junos | =18.2-r2-s2 | |
Juniper Junos | =18.2-r2-s3 | |
Juniper Junos | =18.2-r2-s4 | |
Juniper Junos | =18.2-r2-s5 | |
Juniper Junos | =18.2-r2-s6 | |
Juniper Junos | =18.2-r2-s7 | |
Juniper Junos | =18.2-r3 | |
Juniper Junos | =18.3 | |
Juniper Junos | =18.3-r1 | |
Juniper Junos | =18.3-r1-s1 | |
Juniper Junos | =18.3-r1-s2 | |
Juniper Junos | =18.3-r1-s3 | |
Juniper Junos | =18.3-r1-s4 | |
Juniper Junos | =18.3-r1-s5 | |
Juniper Junos | =18.3-r1-s6 | |
Juniper Junos | =18.3-r2 | |
Juniper Junos | =18.3-r2-s1 | |
Juniper Junos | =18.3-r2-s2 | |
Juniper Junos | =18.4 | |
Juniper Junos | =18.4-r1 | |
Juniper Junos | =18.4-r1-s1 | |
Juniper Junos | =18.4-r1-s2 | |
Juniper Junos | =18.4-r1-s3 | |
Juniper Junos | =18.4-r1-s4 | |
Juniper Junos | =18.4-r1-s5 | |
Juniper Junos | =18.4-r1-s6 | |
Juniper Junos | =18.4-r1-s7 | |
Juniper Junos | =18.4-r2 | |
Juniper Junos | =18.4-r2-s1 | |
Juniper Junos | =18.4-r2-s2 | |
Juniper Junos | =19.1 | |
Juniper Junos | =19.1-r1 | |
Juniper Junos | =19.1-r1-s1 | |
Juniper Junos | =19.1-r1-s2 | |
Juniper Junos | =19.1-r1-s3 | |
Juniper Junos | =19.2 | |
Juniper Junos | =19.2-r1 | |
Juniper SRX1500 | | |
Juniper SRX300 | | |
Juniper SRX320 | | |
Juniper SRX340 | | |
Juniper SRX345 | | |
Juniper SRX380 | | |
Juniper SRX4100 | | |
Juniper SRX4200 | | |
Juniper SRX4600 | | |
Juniper SRX5400 | | |
Juniper SRX550 | | |
juniper srx5600 | | |
Juniper SRX5800 | | |
Remedy
The following software releases have been updated to resolve this specific issue: 15.1X49-D190, 17.4R2-S9, 18.1R3-S9, 18.2R3-S1, 18.3R2-S3, 18.3R3, 18.4R2-S3, 18.4R3, 19.1R1-S4, 19.1R2, 19.2R1-S1, 19.2R2, 19.3R1, and all subsequent releases.
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2021-0249?
The severity of CVE-2021-0249 is categorized as high, due to its potential for remote code execution.
How do I fix CVE-2021-0249?
To fix CVE-2021-0249, update your Junos OS to the latest recommended version as specified in Juniper's security advisories.
Which Juniper devices are affected by CVE-2021-0249?
CVE-2021-0249 affects multiple Juniper SRX Series models running specific versions of Junos OS that have UTM services enabled.
What potential impact does CVE-2021-0249 have on Juniper devices?
CVE-2021-0249 may allow an attacker to execute arbitrary code, potentially leading to unauthorized control of the affected device.
Is there a known exploit for CVE-2021-0249?
As of now, there are no publicly available exploit details for CVE-2021-0249, but the vulnerability poses a significant risk.
- agent/type
- agent/softwarecombine
- agent/title
- agent/weakness
- agent/references
- agent/author
- agent/severity
- agent/description
- collector/mitre-cve
- source/MITRE
- agent/remedy
- agent/last-modified-date
- agent/first-publish-date
- agent/event
- agent/source
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- vendor/juniper
- canonical/juniper junos
- version/juniper junos/15.1x49
- version/juniper junos/15.1x49-d10
- version/juniper junos/15.1x49-d100
- version/juniper junos/15.1x49-d110
- version/juniper junos/15.1x49-d120
- version/juniper junos/15.1x49-d130
- version/juniper junos/15.1x49-d131
- version/juniper junos/15.1x49-d140
- version/juniper junos/15.1x49-d15
- version/juniper junos/15.1x49-d150
- version/juniper junos/15.1x49-d160
- version/juniper junos/15.1x49-d170
- version/juniper junos/15.1x49-d180
- version/juniper junos/15.1x49-d190
- version/juniper junos/15.1x49-d20
- version/juniper junos/15.1x49-d25
- version/juniper junos/15.1x49-d30
- version/juniper junos/15.1x49-d35
- version/juniper junos/15.1x49-d40
- version/juniper junos/15.1x49-d45
- version/juniper junos/15.1x49-d50
- version/juniper junos/15.1x49-d55
- version/juniper junos/15.1x49-d60
- version/juniper junos/15.1x49-d65
- version/juniper junos/15.1x49-d70
- version/juniper junos/15.1x49-d75
- version/juniper junos/15.1x49-d80
- version/juniper junos/15.1x49-d90
- version/juniper junos/17.4
- version/juniper junos/17.4-r1
- version/juniper junos/17.4-r1-s1
- version/juniper junos/17.4-r1-s2
- version/juniper junos/17.4-r1-s3
- version/juniper junos/17.4-r1-s4
- version/juniper junos/17.4-r1-s5
- version/juniper junos/17.4-r1-s6
- version/juniper junos/17.4-r1-s7
- version/juniper junos/17.4-r2
- version/juniper junos/17.4-r2-s1
- version/juniper junos/17.4-r2-s2
- version/juniper junos/17.4-r2-s3
- version/juniper junos/17.4-r2-s4
- version/juniper junos/17.4-r2-s5
- version/juniper junos/17.4-r2-s6
- version/juniper junos/17.4-r2-s7
- version/juniper junos/17.4-r2-s8
- version/juniper junos/17.4-r3
- version/juniper junos/17.4-r3-s1
- version/juniper junos/17.4-r3-s2
- version/juniper junos/17.4-r3-s3
- version/juniper junos/17.4-r3-s4
- version/juniper junos/18.1
- version/juniper junos/18.1-r1
- version/juniper junos/18.1-r2
- version/juniper junos/18.1-r2-s1
- version/juniper junos/18.1-r2-s2
- version/juniper junos/18.1-r2-s4
- version/juniper junos/18.1-r3
- version/juniper junos/18.1-r3-s1
- version/juniper junos/18.1-r3-s10
- version/juniper junos/18.1-r3-s11
- version/juniper junos/18.1-r3-s2
- version/juniper junos/18.1-r3-s3
- version/juniper junos/18.1-r3-s4
- version/juniper junos/18.1-r3-s5
- version/juniper junos/18.1-r3-s6
- version/juniper junos/18.1-r3-s7
- version/juniper junos/18.1-r3-s8
- version/juniper junos/18.2
- version/juniper junos/18.2-r1
- version/juniper junos/18.2-r1-s2
- version/juniper junos/18.2-r1-s3
- version/juniper junos/18.2-r1-s4
- version/juniper junos/18.2-r1-s5
- version/juniper junos/18.2-r2
- version/juniper junos/18.2-r2-s1
- version/juniper junos/18.2-r2-s2
- version/juniper junos/18.2-r2-s3
- version/juniper junos/18.2-r2-s4
- version/juniper junos/18.2-r2-s5
- version/juniper junos/18.2-r2-s6
- version/juniper junos/18.2-r2-s7
- version/juniper junos/18.2-r3
- version/juniper junos/18.3
- version/juniper junos/18.3-r1
- version/juniper junos/18.3-r1-s1
- version/juniper junos/18.3-r1-s2
- version/juniper junos/18.3-r1-s3
- version/juniper junos/18.3-r1-s4
- version/juniper junos/18.3-r1-s5
- version/juniper junos/18.3-r1-s6
- version/juniper junos/18.3-r2
- version/juniper junos/18.3-r2-s1
- version/juniper junos/18.3-r2-s2
- version/juniper junos/18.4
- version/juniper junos/18.4-r1
- version/juniper junos/18.4-r1-s1
- version/juniper junos/18.4-r1-s2
- version/juniper junos/18.4-r1-s3
- version/juniper junos/18.4-r1-s4
- version/juniper junos/18.4-r1-s5
- version/juniper junos/18.4-r1-s6
- version/juniper junos/18.4-r1-s7
- version/juniper junos/18.4-r2
- version/juniper junos/18.4-r2-s1
- version/juniper junos/18.4-r2-s2
- version/juniper junos/19.1
- version/juniper junos/19.1-r1
- version/juniper junos/19.1-r1-s1
- version/juniper junos/19.1-r1-s2
- version/juniper junos/19.1-r1-s3
- version/juniper junos/19.2
- version/juniper junos/19.2-r1
- canonical/juniper srx1500
- canonical/juniper srx300
- canonical/juniper srx320
- canonical/juniper srx340
- canonical/juniper srx345
- canonical/juniper srx380
- canonical/juniper srx4100
- canonical/juniper srx4200
- canonical/juniper srx4600
- canonical/juniper srx5400
- canonical/juniper srx550
- canonical/juniper srx5600
- canonical/juniper srx5800
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203