CVE编号
CVE-2021-0261利用情况
暂无补丁情况
N/A披露时间
2021-04-23漏洞描述
A vulnerability in the HTTP/HTTPS service used by J-Web, Web Authentication, Dynamic-VPN (DVPN), Firewall Authentication Pass-Through with Web-Redirect, and Captive Portal allows an unauthenticated attacker to cause an extended Denial of Service (DoS) for these services by sending a high number of specific requests. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S17 on EX Series; 12.3X48 versions prior to 12.3X48-D105 on SRX Series; 15.1 versions prior to 15.1R7-S8; 15.1X49 versions prior to 15.1X49-D230 on SRX Series; 16.1 versions prior to 16.1R7-S8; 17.4 versions prior to 17.4R2-S12, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2; 20.2 versions prior to 20.2R1-S1, 20.2R2.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://kb.juniper.net/JSA11152 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | juniper | junos | 12.3 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 12.3x48 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 15.1x49 | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex2300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex2300-c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex3400 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex4300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex4400 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex4600 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex4650 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex9200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ex9250 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx1500 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx300 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx320 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx340 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx345 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx380 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx4100 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx4200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx4600 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx5400 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx550 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx5600 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | srx5800 | - | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...