CVE-2021-0268

Sep 3, 2024

Published Date: 2021-04-22T20:15Z
Last Modified: 2022-08-05T17:14Z

CVSS Score: 9.3 (CRITICAL)

EPSS Score: 0.17%

Risk Score: 6.51 (HIGH)

Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.

Meter Needle
CVSS: 9.3  |  EPSS: 0.17%

Description: An Improper Neutralization of CRLF Sequences in HTTP Headers (‘HTTP Response Splitting’) weakness in J-web of Juniper Networks Junos OS leads to buffer overflows, segment faults, or other impacts, which allows an attacker to modify the integrity of the device and exfiltration information from the device without authentication. The weakness can be exploited to facilitate cross-site scripting (XSS), cookie manipulation (modifying session cookies, stealing cookies) and more. This weakness can also be exploited by directing a user to a seemingly legitimate link from the affected site. The attacker requires no special access or permissions to the device to carry out such attacks. This issue affects: Juniper Networks Junos OS: 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S3; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2, 19.4R3; 20.1 versions prior to 20.1R1-S2, 20.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 18.1R1.

Mitre ATT&CK Technical v15.1

T1064 – Scripting
T1053.002 – At

Technical Analysis & Mitigation Measures

Reference Links

Vendor - Produce - Version

junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper, junos - juniper

Disclaimer

The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.