You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to
https://nvd.nist.gov
An official website of the United States government
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.
Description
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.
Metrics
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected].
AND
OR
*cpe:2.3:o:juniper:junos:5.6:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* versions from (including) 5.7 up to (excluding) 15.1
*cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* versions from (including) 15.2 up to (excluding) 18.4
*cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*
*cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*
Changed
Reference Type
https://kb.juniper.net/JSA11191 No Types Assigned
https://kb.juniper.net/JSA11191 Vendor Advisory
CVE Modified by Juniper Networks, Inc.7/15/2021 5:15:08 PM
Action
Type
Old Value
New Value
Changed
Description
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer.
To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below.
An example output is:
show interfaces extensive | match policer
Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed
Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface
For all platforms, except SRX Series:
This issue affects Juniper Networks Junos OS:
All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions;
19.4 versions prior to 19.4R3-S3;
20.1 versions prior to 20.1R3;
20.2 versions prior to 20.2R3-S2;
20.3 version 20.3R1 and later versions;
20.4 versions prior to 20.4R3;
21.1 versions prior to 21.1R2;
This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1.
On SRX Series this issue affects Juniper Networks Junos OS:
18.4 versions prior to 18.4R2-S9, 18.4R3-S9;
19.4 versions prior to 19.4R3-S4;
20.1 versions prior to 20.1R3;
20.2 versions prior to 20.2R3-S2;
20.3 version 20.3R1 and later versions;
20.4 versions prior to 20.4R3;
21.1 versions prior to 21.1R2.
This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series.
This issue does not affect Junos OS Evolved.
When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.
Quick Info
CVE Dictionary Entry: CVE-2021-0289 NVD
Published Date: 07/15/2021 NVD
Last Modified: 11/21/2024
Source: Juniper Networks, Inc.