Description: A vulnerability in the processing of TCP MD5 authentication in Juniper Networks Junos OS Evolved may allow a BGP or LDP session configured with MD5 authentication to succeed, even if the peer does not have TCP MD5 authentication enabled. This could lead to untrusted or unauthorized sessions being established, resulting in an impact on confidentiality or stability of the network. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.3R2-S1-EVO; 20.4 versions prior to 20.4R2-EVO; 21.1 versions prior to 21.1R2-EVO. Juniper Networks Junos OS is not affected by this issue.
CVE-2021-0297
Published Date: 2021-10-19T19:15Z
Last Modified: 2021-10-25T15:20Z
CVSS Score: 6.5 (MEDIUM)
EPSS Score: 0.08%
Risk Score: 4.55 (MEDIUM)
Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.
CVSS:
6.5 |
EPSS:
0.08%
Mitre ATT&CK Technical v15.1
T1053.002 – At
Technical Analysis & Mitigation Measures
Reference Links
Vendor - Produce - Version
junos_os_evolved - juniper, junos_os_evolved - juniper, junos_os_evolved - juniper, junos_os_evolved - juniper, junos_os_evolved - juniper
Disclaimer
The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.