Description Preview
Overview
This vulnerability (CVE-2021-0254) affects the overlayd service in Juniper Networks Junos OS. The overlayd daemon processes Overlay OAM packets such as ping and traceroute sent to the overlay network. Due to improper buffer size validation, an attacker can send specially crafted packets to trigger a buffer overflow, potentially resulting in remote code execution or a partial denial of service condition. The service runs with root privileges by default and listens on UDP port 4789.
The vulnerability affects MX Series, ACX Series, and QFX Series platforms by default, as well as other platforms where Virtual Extensible LAN (VXLAN) overlay networks are configured. SRX Series devices do not support VXLAN and are therefore not vulnerable to this issue.
Remediation
To address this vulnerability, users should upgrade to a fixed version of Juniper Networks Junos OS:
- For 15.1: Upgrade to 15.1R7-S9 or later
- For 17.3: Upgrade to 17.3R3-S11 or later
- For 17.4: Upgrade to 17.4R2-S13, 17.4R3-S4, or later
- For 18.1: Upgrade to 18.1R3-S12 or later
- For 18.2: Upgrade to 18.2R2-S8, 18.2R3-S7, or later
- For 18.3: Upgrade to 18.3R3-S4 or later
- For 18.4: Upgrade to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7, or later
- For 19.1: Upgrade to 19.1R2-S2, 19.1R3-S4, or later
- For 19.2: Upgrade to 19.2R1-S6, 19.2R3-S2, or later
- For 19.3: Upgrade to 19.3R3-S1 or later
- For 19.4: Upgrade to 19.4R2-S4, 19.4R3-S1, or later
- For 20.1: Upgrade to 20.1R2-S1, 20.1R3, or later
- For 20.2: Upgrade to 20.2R2, 20.2R2-S1, 20.2R3, or later
- For 20.3: Upgrade to 20.3R1-S1 or later
If upgrading is not immediately possible, consider implementing network security controls to restrict access to UDP port 4789 to trusted sources only.
References
- Juniper Networks Security Advisory JSA11147: https://kb.juniper.net/JSA11147
- Common Weakness Enumeration: CWE-787 (Out-of-bounds Write)
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Public AdministrationPublic Administration
- Health Care & Social AssistanceHealth Care & Social Assistance
- Finance and InsuranceFinance and Insurance
- ManufacturingManufacturing
- Educational ServicesEducational Services
- UtilitiesUtilities
- InformationInformation
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Transportation & WarehousingTransportation & Warehousing
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- Other Services (except Public Administration)Other Services (except Public Administration)
- Retail TradeRetail Trade
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- ConstructionConstruction
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- MiningMining
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Wholesale TradeWholesale Trade