Executive Summary

Informations
Name CVE-2021-31361 First vendor Publication 2021-10-19
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

An Improper Check for Unusual or Exceptional Conditions vulnerability combined with Improper Handling of Exceptional Conditions in Juniper Networks Junos OS on QFX Series and PTX Series allows an unauthenticated network based attacker to cause increased FPC CPU utilization by sending specific IP packets which are being VXLAN encapsulated leading to a partial Denial of Service (DoS). Continued receipted of these specific traffic will create a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS on QFX Series: All versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S3, 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. Juniper Networks Junos OS on PTX Series: All versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S6; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R2-S6, 19.3R3-S3; 19.4 versions prior to 19.4R1-S4, 19.4R3-S5; 20.1 versions prior to 20.1R2-S2, 20.1R3; 20.2 versions prior to 20.2R3-S1; 20.3 versions prior to 20.3R2-S1, 20.3R3; 20.4 versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31361

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-754 Improper Check for Unusual or Exceptional Conditions

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 214

Sources (Detail)

https://kb.juniper.net/JSA11223
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2025-06-26 01:44:49
  • Multiple Updates
2025-06-25 12:13:55
  • Multiple Updates
2025-03-29 02:49:49
  • Multiple Updates
2025-03-28 13:25:23
  • Multiple Updates
2024-11-28 13:56:26
  • Multiple Updates
2024-08-02 13:25:04
  • Multiple Updates
2024-08-02 01:25:34
  • Multiple Updates
2024-02-02 02:25:18
  • Multiple Updates
2024-02-01 12:23:52
  • Multiple Updates
2023-09-05 13:19:37
  • Multiple Updates
2023-09-05 01:23:24
  • Multiple Updates
2023-09-02 13:18:14
  • Multiple Updates
2023-09-02 01:23:45
  • Multiple Updates
2023-08-12 13:24:19
  • Multiple Updates
2023-08-12 01:22:59
  • Multiple Updates
2023-08-11 13:16:36
  • Multiple Updates
2023-08-11 01:23:45
  • Multiple Updates
2023-08-06 13:14:36
  • Multiple Updates
2023-08-06 01:22:44
  • Multiple Updates
2023-08-04 13:14:58
  • Multiple Updates
2023-08-04 01:23:05
  • Multiple Updates
2023-07-14 13:15:02
  • Multiple Updates
2023-07-14 01:22:53
  • Multiple Updates
2023-03-29 02:17:13
  • Multiple Updates
2023-03-28 12:23:07
  • Multiple Updates
2022-10-27 21:27:40
  • Multiple Updates
2022-10-11 13:07:00
  • Multiple Updates
2022-10-11 01:22:36
  • Multiple Updates
2021-10-26 09:22:58
  • Multiple Updates
2021-10-25 21:22:56
  • Multiple Updates
2021-10-20 00:22:50
  • First insertion