CWE
787 131 119
Advisory Published
Updated

CVE-2021-0254: Junos OS: Remote code execution vulnerability in overlayd service

First published: Thu Apr 22 2021(Updated: )

A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS may allow an unauthenticated remote attacker to send specially crafted packets to the device, triggering a partial Denial of Service (DoS) condition, or leading to remote code execution (RCE). Continued receipt and processing of these packets will sustain the partial DoS. The overlayd daemon handles Overlay OAM packets, such as ping and traceroute, sent to the overlay. The service runs as root by default and listens for UDP connections on port 4789. This issue results from improper buffer size validation, which can lead to a buffer overflow. Unauthenticated attackers can send specially crafted packets to trigger this vulnerability, resulting in possible remote code execution. overlayd runs by default in MX Series, ACX Series, and QFX Series platforms. The SRX Series does not support VXLAN and is therefore not vulnerable to this issue. Other platforms are also vulnerable if a Virtual Extensible LAN (VXLAN) overlay network is configured. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S9; 17.3 versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S4, 19.4R3-S1; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2, 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S1.

Credit: sirt@juniper.net

Affected SoftwareAffected VersionHow to fix
Junos OS Evolved=15.1
Junos OS Evolved=15.1-a1
Junos OS Evolved=15.1-f
Junos OS Evolved=15.1-f1
Junos OS Evolved=15.1-f2
Junos OS Evolved=15.1-f2-s1
Junos OS Evolved=15.1-f2-s2
Junos OS Evolved=15.1-f2-s3
Junos OS Evolved=15.1-f2-s4
Junos OS Evolved=15.1-f3
Junos OS Evolved=15.1-f4
Junos OS Evolved=15.1-f5
Junos OS Evolved=15.1-f5-s7
Junos OS Evolved=15.1-f6
Junos OS Evolved=15.1-f6-s1
Junos OS Evolved=15.1-f6-s10
Junos OS Evolved=15.1-f6-s12
Junos OS Evolved=15.1-f6-s2
Junos OS Evolved=15.1-f6-s3
Junos OS Evolved=15.1-f6-s4
Junos OS Evolved=15.1-f6-s5
Junos OS Evolved=15.1-f6-s6
Junos OS Evolved=15.1-f6-s7
Junos OS Evolved=15.1-f6-s8
Junos OS Evolved=15.1-f6-s9
Junos OS Evolved=15.1-f7
Junos OS Evolved=15.1-r
Junos OS Evolved=15.1-r1
Junos OS Evolved=15.1-r2
Junos OS Evolved=15.1-r3
Junos OS Evolved=15.1-r4
Junos OS Evolved=15.1-r4-s7
Junos OS Evolved=15.1-r4-s8
Junos OS Evolved=15.1-r4-s9
Junos OS Evolved=15.1-r5
Junos OS Evolved=15.1-r5-s1
Junos OS Evolved=15.1-r5-s3
Junos OS Evolved=15.1-r5-s5
Junos OS Evolved=15.1-r5-s6
Junos OS Evolved=15.1-r6
Junos OS Evolved=15.1-r6-s1
Junos OS Evolved=15.1-r6-s2
Junos OS Evolved=15.1-r6-s3
Junos OS Evolved=15.1-r6-s4
Junos OS Evolved=15.1-r6-s6
Junos OS Evolved=15.1-r7
Junos OS Evolved=15.1-r7-s1
Junos OS Evolved=15.1-r7-s2
Junos OS Evolved=15.1-r7-s3
Junos OS Evolved=15.1-r7-s4
Junos OS Evolved=15.1-r7-s5
Junos OS Evolved=15.1-r7-s6
Junos OS Evolved=15.1-r7-s7
Junos OS Evolved=15.1-r7-s8
Junos OS Evolved=17.3
Junos OS Evolved=17.3-r1
Junos OS Evolved=17.3-r1-s1
Junos OS Evolved=17.3-r1-s4
Junos OS Evolved=17.3-r2
Junos OS Evolved=17.3-r2-s1
Junos OS Evolved=17.3-r2-s2
Junos OS Evolved=17.3-r2-s3
Junos OS Evolved=17.3-r2-s4
Junos OS Evolved=17.3-r2-s5
Junos OS Evolved=17.3-r3
Junos OS Evolved=17.3-r3
Junos OS Evolved=17.3-r3-s1
Junos OS Evolved=17.3-r3-s10
Junos OS Evolved=17.3-r3-s2
Junos OS Evolved=17.3-r3-s3
Junos OS Evolved=17.3-r3-s4
Junos OS Evolved=17.3-r3-s5
Junos OS Evolved=17.3-r3-s6
Junos OS Evolved=17.3-r3-s7
Junos OS Evolved=17.3-r3-s8
Junos OS Evolved=17.3-r3-s9
Junos OS Evolved=17.4
Junos OS Evolved=17.4-r1
Junos OS Evolved=17.4-r1-s1
Junos OS Evolved=17.4-r1-s2
Junos OS Evolved=17.4-r1-s3
Junos OS Evolved=17.4-r1-s4
Junos OS Evolved=17.4-r1-s5
Junos OS Evolved=17.4-r1-s6
Junos OS Evolved=17.4-r1-s7
Junos OS Evolved=17.4-r2
Junos OS Evolved=17.4-r2-s1
Junos OS Evolved=17.4-r2-s10
Junos OS Evolved=17.4-r2-s11
Junos OS Evolved=17.4-r2-s12
Junos OS Evolved=17.4-r2-s2
Junos OS Evolved=17.4-r2-s3
Junos OS Evolved=17.4-r2-s4
Junos OS Evolved=17.4-r2-s5
Junos OS Evolved=17.4-r2-s6
Junos OS Evolved=17.4-r2-s7
Junos OS Evolved=17.4-r2-s8
Junos OS Evolved=17.4-r2-s9
Junos OS Evolved=17.4-r3
Junos OS Evolved=17.4-r3-s1
Junos OS Evolved=17.4-r3-s2
Junos OS Evolved=17.4-r3-s3
Junos OS Evolved=18.1
Junos OS Evolved=18.1-r1
Junos OS Evolved=18.1-r2
Junos OS Evolved=18.1-r2-s1
Junos OS Evolved=18.1-r2-s2
Junos OS Evolved=18.1-r2-s4
Junos OS Evolved=18.1-r3
Junos OS Evolved=18.1-r3-s1
Junos OS Evolved=18.1-r3-s10
Junos OS Evolved=18.1-r3-s11
Junos OS Evolved=18.1-r3-s2
Junos OS Evolved=18.1-r3-s3
Junos OS Evolved=18.1-r3-s4
Junos OS Evolved=18.1-r3-s5
Junos OS Evolved=18.1-r3-s6
Junos OS Evolved=18.1-r3-s7
Junos OS Evolved=18.1-r3-s8
Junos OS Evolved=18.1-r3-s9
Junos OS Evolved=18.2
Junos OS Evolved=18.2-r1
Junos OS Evolved=18.2-r1-s2
Junos OS Evolved=18.2-r1-s3
Junos OS Evolved=18.2-r1-s4
Junos OS Evolved=18.2-r1-s5
Junos OS Evolved=18.2-r2
Junos OS Evolved=18.2-r2-s1
Junos OS Evolved=18.2-r2-s2
Junos OS Evolved=18.2-r2-s3
Junos OS Evolved=18.2-r2-s4
Junos OS Evolved=18.2-r2-s5
Junos OS Evolved=18.2-r2-s6
Junos OS Evolved=18.2-r2-s7
Junos OS Evolved=18.2-r3
Junos OS Evolved=18.2-r3-s1
Junos OS Evolved=18.2-r3-s2
Junos OS Evolved=18.2-r3-s3
Junos OS Evolved=18.2-r3-s4
Junos OS Evolved=18.2-r3-s5
Junos OS Evolved=18.2-r3-s6
Junos OS Evolved=18.3
Junos OS Evolved=18.3-r1
Junos OS Evolved=18.3-r1-s1
Junos OS Evolved=18.3-r1-s2
Junos OS Evolved=18.3-r1-s3
Junos OS Evolved=18.3-r1-s4
Junos OS Evolved=18.3-r1-s5
Junos OS Evolved=18.3-r1-s6
Junos OS Evolved=18.3-r2
Junos OS Evolved=18.3-r2-s1
Junos OS Evolved=18.3-r2-s2
Junos OS Evolved=18.3-r2-s3
Junos OS Evolved=18.3-r2-s4
Junos OS Evolved=18.3-r3
Junos OS Evolved=18.3-r3-s1
Junos OS Evolved=18.3-r3-s2
Junos OS Evolved=18.3-r3-s3
Junos OS Evolved=18.4
Junos OS Evolved=18.4-r1
Junos OS Evolved=18.4-r1-s1
Junos OS Evolved=18.4-r1-s2
Junos OS Evolved=18.4-r1-s3
Junos OS Evolved=18.4-r1-s4
Junos OS Evolved=18.4-r1-s5
Junos OS Evolved=18.4-r1-s6
Junos OS Evolved=18.4-r1-s7
Junos OS Evolved=18.4-r2
Junos OS Evolved=18.4-r2-s1
Junos OS Evolved=18.4-r2-s2
Junos OS Evolved=18.4-r2-s3
Junos OS Evolved=18.4-r2-s4
Junos OS Evolved=18.4-r2-s5
Junos OS Evolved=18.4-r2-s6
Junos OS Evolved=18.4-r3
Junos OS Evolved=18.4-r3-s1
Junos OS Evolved=18.4-r3-s2
Junos OS Evolved=18.4-r3-s3
Junos OS Evolved=18.4-r3-s4
Junos OS Evolved=18.4-r3-s5
Junos OS Evolved=18.4-r3-s6
Junos OS Evolved=19.1
Junos OS Evolved=19.1-r1
Junos OS Evolved=19.1-r1-s1
Junos OS Evolved=19.1-r1-s2
Junos OS Evolved=19.1-r1-s3
Junos OS Evolved=19.1-r1-s4
Junos OS Evolved=19.1-r1-s5
Junos OS Evolved=19.1-r2
Junos OS Evolved=19.1-r2-s1
Junos OS Evolved=19.1-r3
Junos OS Evolved=19.1-r3-s1
Junos OS Evolved=19.1-r3-s2
Junos OS Evolved=19.1-r3-s3
Junos OS Evolved=19.2
Junos OS Evolved=19.2-r1
Junos OS Evolved=19.2-r1-s1
Junos OS Evolved=19.2-r1-s2
Junos OS Evolved=19.2-r1-s3
Junos OS Evolved=19.2-r1-s4
Junos OS Evolved=19.2-r1-s5
Junos OS Evolved=19.2-r2
Junos OS Evolved=19.2-r2-s1
Junos OS Evolved=19.2-r3
Junos OS Evolved=19.2-r3-s1
Junos OS Evolved=19.3
Junos OS Evolved=19.3-r1
Junos OS Evolved=19.3-r1-s1
Junos OS Evolved=19.3-r2
Junos OS Evolved=19.3-r2-s1
Junos OS Evolved=19.3-r2-s2
Junos OS Evolved=19.3-r2-s3
Junos OS Evolved=19.3-r2-s4
Junos OS Evolved=19.3-r2-s5
Junos OS Evolved=19.3-r3
Junos OS Evolved=19.4-r1
Junos OS Evolved=19.4-r1-s1
Junos OS Evolved=19.4-r1-s2
Junos OS Evolved=19.4-r2
Junos OS Evolved=19.4-r2-s1
Junos OS Evolved=19.4-r2-s2
Junos OS Evolved=19.4-r2-s3
Junos OS Evolved=19.4-r3
Junos OS Evolved=20.1-r1
Junos OS Evolved=20.1-r1-s1
Junos OS Evolved=20.1-r1-s2
Junos OS Evolved=20.1-r1-s3
Junos OS Evolved=20.1-r1-s4
Junos OS Evolved=20.1-r2
Junos OS Evolved=20.2-r1
Junos OS Evolved=20.2-r1-s1
Junos OS Evolved=20.2-r1-s2
Junos OS Evolved=20.2-r1-s3
Junos OS Evolved=20.2-r2
Junos OS Evolved=20.3-r1

Remedy

The following software releases have been updated to resolve this specific issue: Junos OS 15.1X49-D240, 15.1R7-S9, 17.3R3-S11, 17.4R2-S13, 17.4R3-S4, 18.1R3-S12, 18.2R2-S8, 18.2R3-S7, 18.3R3-S4, 18.4R1-S8, 18.4R2-S7, 18.4R3-S7, 19.1R2-S2, 19.1R3-S4, 19.2R1-S6, 19.2R3-S2, 19.3R3-S1, 19.4R2-S4, 19.4R3-S1, 20.1R2-S1, 20.1R3, 20.2R2, 20.2R2-S1, 20.2R3, 20.3R1-S1, 20.4R1, and all subsequent releases. This fix has also been proactively committed into other releases that might not be vulnerable to this issue.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-0254?

    CVE-2021-0254 has a high severity level due to its potential to cause partial Denial of Service (DoS) and remote code execution (RCE).

  • How do I fix CVE-2021-0254?

    To fix CVE-2021-0254, update your Junos OS to the latest patched version provided by Juniper Networks.

  • Which versions of Junos OS are affected by CVE-2021-0254?

    CVE-2021-0254 affects multiple versions of Junos OS, specifically versions 15.1, 17.3, 17.4, 18.1, 18.2, and 18.3.

  • Can CVE-2021-0254 be exploited remotely?

    Yes, CVE-2021-0254 can be exploited remotely by an unauthenticated attacker through specially crafted packets.

  • What are the potential consequences of exploiting CVE-2021-0254?

    Exploiting CVE-2021-0254 can lead to a partial Denial of Service condition or, in a worst-case scenario, remote code execution.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203