CVE编号
CVE-2021-0280利用情况
暂无补丁情况
N/A披露时间
2021-07-16漏洞描述
Due to an Improper Initialization vulnerability in Juniper Networks Junos OS on PTX platforms and QFX10K Series with Paradise (PE) chipset-based line cards, ddos-protection configuration changes made from the CLI will not take effect as expected beyond the default DDoS (Distributed Denial of Service) settings in the Packet Forwarding Engine (PFE). This may cause BFD sessions to flap when a high rate of specific packets are received. Flapping of BFD sessions in turn may impact routing protocols and network stability, leading to a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects only the following platforms with Paradise (PE) chipset-based line cards: PTX1000, PTX3000 (NextGen), PTX5000, PTX10008, PTX10016 Series and QFX10002 Series. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R3-S5 on PTX Series, QFX10K Series; 18.2 versions prior to 18.2R3-S8 on PTX Series, QFX10K Series; 18.3 versions prior to 18.3R3-S5 on PTX Series, QFX10K Series; 18.4 versions prior to 18.4R2-S8 on PTX Series, QFX10K Series; 19.1 versions prior to 19.1R3-S5 on PTX Series, QFX10K Series; 19.2 versions prior to 19.2R3-S2 on PTX Series, QFX10K Series; 19.3 versions prior to 19.3R3-S2 on PTX Series, QFX10K Series; 19.4 versions prior to 19.4R3-S2 on PTX Series, QFX10K Series; 20.1 versions prior to 20.1R3 on PTX Series, QFX10K Series; 20.2 versions prior to 20.2R2-S3, 20.2R3 on PTX Series, QFX10K Series; 20.3 versions prior to 20.3R2 on PTX Series, QFX10K Series; 20.4 versions prior to 20.4R2 on PTX Series, QFX10K Series.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://kb.juniper.net/JSA11184 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | juniper | junos | 17.4 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 18.2 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 18.3 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 18.4 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 19.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 19.2 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 19.3 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 19.4 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 20.1 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 20.2 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 20.3 | - | |||||
运行在以下环境 | |||||||||
系统 | juniper | junos | 20.4 | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx1000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx1000-72q | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10001 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10001-36mr | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx100016 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10002 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10002-60c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10003 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10003_160c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10003_80c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10003_81cd | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10004 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10008 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx10016 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx3000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | ptx5000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10002 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10002-32q | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10002-60c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10002-72q | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10008 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | juniper | qfx10016 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...