CVE-2021-0254:Buffer Size Validation Vulnerability in Juniper Networks Junos OS Overlayd Service

splash
Back

Description Preview

A buffer size validation vulnerability in the overlayd service of Juniper Networks Junos OS allows unauthenticated remote attackers to cause a partial Denial of Service (DoS) condition or potentially execute remote code. The vulnerability exists due to improper buffer size validation leading to a buffer overflow in the overlayd service, which handles Overlay OAM packets and runs as root by default on UDP port 4789.

Overview

This vulnerability (CVE-2021-0254) affects the overlayd service in Juniper Networks Junos OS. The overlayd daemon processes Overlay OAM packets such as ping and traceroute sent to the overlay network. Due to improper buffer size validation, an attacker can send specially crafted packets to trigger a buffer overflow, potentially resulting in remote code execution or a partial denial of service condition. The service runs with root privileges by default and listens on UDP port 4789.

The vulnerability affects MX Series, ACX Series, and QFX Series platforms by default, as well as other platforms where Virtual Extensible LAN (VXLAN) overlay networks are configured. SRX Series devices do not support VXLAN and are therefore not vulnerable to this issue.

Remediation

To address this vulnerability, users should upgrade to a fixed version of Juniper Networks Junos OS:

  • For 15.1: Upgrade to 15.1R7-S9 or later
  • For 17.3: Upgrade to 17.3R3-S11 or later
  • For 17.4: Upgrade to 17.4R2-S13, 17.4R3-S4, or later
  • For 18.1: Upgrade to 18.1R3-S12 or later
  • For 18.2: Upgrade to 18.2R2-S8, 18.2R3-S7, or later
  • For 18.3: Upgrade to 18.3R3-S4 or later
  • For 18.4: Upgrade to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7, or later
  • For 19.1: Upgrade to 19.1R2-S2, 19.1R3-S4, or later
  • For 19.2: Upgrade to 19.2R1-S6, 19.2R3-S2, or later
  • For 19.3: Upgrade to 19.3R3-S1 or later
  • For 19.4: Upgrade to 19.4R2-S4, 19.4R3-S1, or later
  • For 20.1: Upgrade to 20.1R2-S1, 20.1R3, or later
  • For 20.2: Upgrade to 20.2R2, 20.2R2-S1, 20.2R3, or later
  • For 20.3: Upgrade to 20.3R1-S1 or later

If upgrading is not immediately possible, consider implementing network security controls to restrict access to UDP port 4789 to trusted sources only.

References

  1. Juniper Networks Security Advisory JSA11147: https://kb.juniper.net/JSA11147
  2. Common Weakness Enumeration: CWE-787 (Out-of-bounds Write)

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Public Administration
    Public Administration
  2. Health Care & Social Assistance
    Health Care & Social Assistance
  3. Finance and Insurance
    Finance and Insurance
  4. Manufacturing
    Manufacturing
  5. Educational Services
    Educational Services
  6. Utilities
    Utilities
  7. Information
    Information
  8. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  9. Transportation & Warehousing
    Transportation & Warehousing
  10. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  11. Other Services (except Public Administration)
    Other Services (except Public Administration)
  12. Retail Trade
    Retail Trade
  13. Accommodation & Food Services
    Accommodation & Food Services
  14. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  15. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  16. Construction
    Construction
  17. Management of Companies & Enterprises
    Management of Companies & Enterprises
  18. Mining
    Mining
  19. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database