First published: Wed Oct 13 2021(Updated: )
A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside the attacker's control, leading to a Denial of Service (DoS) condition. Continued execution of the CLI command, under precise conditions, could create a sustained Denial of Service (DoS) condition. This issue affects all Juniper Networks Junos OS Evolved versions prior to 20.1R2-EVO on PTX10003 and PTX10008 platforms. Junos OS is not affected by this vulnerability.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos Os Evolved | =18.3-r1 | |
Juniper Junos Os Evolved | =19.1-r1 | |
Juniper Junos Os Evolved | =19.1-r2 | |
Juniper Junos Os Evolved | =19.2-r1 | |
Juniper Junos Os Evolved | =19.2-r2 | |
Juniper Junos Os Evolved | =19.3-r1 | |
Juniper Junos Os Evolved | =19.3-r2 | |
Juniper Junos Os Evolved | =19.4-r1 | |
Juniper Junos Os Evolved | =19.4-r1-s1 | |
Juniper Junos Os Evolved | =20.1-r1 | |
Juniper Junos Os Evolved | =20.1-r1-s1 | |
Juniper Ptx10003 | ||
Juniper Ptx10008 |
The following software releases have been updated to resolve this specific issue: Junos OS Evolved 20.1R2-EVO, 20.2R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-0298 is a race condition vulnerability in Juniper Networks Junos OS Evolved.
CVE-2021-0298 may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC in Juniper Junos OS Evolved.
CVE-2021-0298 has a severity rating of 4.7 out of 10.
A fix for CVE-2021-0298 is not currently available, but you can mitigate the risk by restricting access to the vulnerable command.
You can find more information about CVE-2021-0298 on the Juniper Networks Knowledge Base: https://kb.juniper.net/JSA11212