SB2021041605 - DDoS protection bypass in Juniper Junos OS



SB2021041605 - DDoS protection bypass in Juniper Junos OS

Published: April 16, 2021

Security Bulletin ID SB2021041605
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper Initialization (CVE-ID: CVE-2021-0234)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to improper initialization on Juniper Networks Junos OS QFX5100-96S devices with QFX 5e Series image installed, ddos-protection configuration changes will not take effect beyond the default DDoS (Distributed Denial of Service) settings when configured from the CLI. The DDoS protection (jddosd) daemon allows the device to continue to function while protecting the packet forwarding engine (PFE) during the DDoS attack. When this issue occurs, the default DDoS settings within the PFE apply, as CPU bound packets will be throttled and dropped in the PFE when the limits are exceeded.


Remediation

Install update from vendor's website.