On SRX Series devices configured with UTM services a buffer overflow vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS may allow an attacker to arbitrarily execute code or commands on the target to take over or otherwise impact the device by sending crafted packets to or through the device. This issue affects: Juniper Networks Junos OS on SRX Series: 15.1X49 versions prior to 15.1X49-D190; 17.4 versions prior to 17.4R2-S9; 17.4R3 and later versions prior to 18.1R3-S9; 18.2 versions prior to 18.2R3-S1; 18.3 versions prior to 18.3R2-S3, 18.3R3; 18.4 versions prior to 18.4R2-S3, 18.4R3; 19.1 versions prior to 19.1R1-S4, 19.1R2; 19.2 versions prior to 19.2R1-S1, 19.2R2. An indicator of compromise can be the following text in the UTM log: RT_UTM: AV_FILE_NOT_SCANNED_PASSED_MT:
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA11142 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-04-22 13:15
Updated : 2021-04-27 07:39
NVD link : CVE-2021-0249
Mitre link : CVE-2021-0249
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
juniper
- srx5800
- srx1500
- srx4100
- srx5400
- junos
- srx380
- srx345
- srx550
- srx4600
- srx300
- srx4200
- srx320
- srx340
- srx5600