6.5
MEDIUM
CVE-2021-0289
Juniper Junos OS ARP Policer TOCTOU Race Condition
Description

When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.

INFO

Published Date :

July 15, 2021, 8:15 p.m.

Last Modified :

Nov. 21, 2024, 5:42 a.m.

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

2.8
Affected Products

The following products are affected by CVE-2021-0289 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Juniper junos
2 Juniper junos_os_evolved
3 Juniper srx100
4 Juniper srx110
5 Juniper srx210
6 Juniper srx220
7 Juniper srx240
8 Juniper srx550
9 Juniper srx650
10 Juniper srx1400
11 Juniper srx3400
12 Juniper srx3600
13 Juniper srx5600
14 Juniper srx5800
15 Juniper idp250
16 Juniper idp75
17 Juniper idp800
18 Juniper idp8200
19 Juniper netscreen-5200
20 Juniper netscreen-5400
21 Juniper dx
22 Juniper junos_space_ja1500_appliance
23 Juniper netscreen-5gt
24 Juniper netscreen-idp
25 Juniper netscreen-idp_10
26 Juniper netscreen-idp_100
27 Juniper netscreen-idp_1000
28 Juniper netscreen-idp_500
29 Juniper fips_secure_access_4000
30 Juniper fips_secure_access_4500
31 Juniper fips_secure_access_6000
32 Juniper fips_secure_access_6500
33 Juniper mag2600_gateway
34 Juniper mag4610_gateway
35 Juniper mag6610_gateway
36 Juniper mag6611_gateway
37 Juniper secure_access_2000
38 Juniper secure_access_2500
39 Juniper secure_access_4000
40 Juniper secure_access_4500
41 Juniper secure_access_6000
42 Juniper secure_access_6500
43 Juniper secure_access_700
44 Juniper nsm3000
45 Juniper nsmexpress
46 Juniper junos_space_ja2500_appliance
47 Juniper fips_infranet_controller_6500
48 Juniper infranet_controller_4000
49 Juniper infranet_controller_4500
50 Juniper infranet_controller_6000
51 Juniper infranet_controller_6500
52 Juniper ex2200
53 Juniper ex2200-c
54 Juniper ex2200-vc
55 Juniper ex2300
56 Juniper ex2300-c
57 Juniper ex2300m
58 Juniper ex3200
59 Juniper ex3300
60 Juniper ex3300-vc
61 Juniper ex3400
62 Juniper ex4200
63 Juniper ex4200-vc
64 Juniper ex4300
65 Juniper ex4300-24p
66 Juniper ex4300-24p-s
67 Juniper ex4300-24t
68 Juniper ex4300-24t-s
69 Juniper ex4300-32f
70 Juniper ex4300-32f-dc
71 Juniper ex4300-32f-s
72 Juniper ex4300-48mp
73 Juniper ex4300-48mp-s
74 Juniper ex4300-48p
75 Juniper ex4300-48p-s
76 Juniper ex4300-48t
77 Juniper ex4300-48t-afi
78 Juniper ex4300-48t-dc
79 Juniper ex4300-48t-dc-afi
80 Juniper ex4300-48t-s
81 Juniper ex4300-48tafi
82 Juniper ex4300-48tdc
83 Juniper ex4300-48tdc-afi
84 Juniper ex4300-mp
85 Juniper ex4300-vc
86 Juniper ex4300m
87 Juniper ex4400
88 Juniper ex4500
89 Juniper ex4500-vc
90 Juniper ex4550
91 Juniper ex4550-vc
92 Juniper ex4550\/vc
93 Juniper ex4600
94 Juniper ex4600-vc
95 Juniper ex4650
96 Juniper ex6200
97 Juniper ex6210
98 Juniper ex8200
99 Juniper ex8200-vc
100 Juniper ex8208
101 Juniper ex8216
102 Juniper ex9200
103 Juniper ex9204
104 Juniper ex9208
105 Juniper ex9214
106 Juniper ex9250
107 Juniper ex9251
108 Juniper ex9253
109 Juniper srx1500
110 Juniper srx240h2
111 Juniper srx300
112 Juniper srx320
113 Juniper srx340
114 Juniper srx345
115 Juniper srx380
116 Juniper srx4000
117 Juniper srx4100
118 Juniper srx4200
119 Juniper srx4600
120 Juniper srx5000
121 Juniper srx5400
122 Juniper srx550_hm
123 Juniper srx550m
124 Juniper mx10
125 Juniper mx104
126 Juniper mx2010
127 Juniper mx2020
128 Juniper mx240
129 Juniper mx40
130 Juniper mx480
131 Juniper mx80
132 Juniper mx960
133 Juniper mx
134 Juniper mx10000
135 Juniper mx10003
136 Juniper mx10008
137 Juniper mx10016
138 Juniper mx150
139 Juniper mx2008
140 Juniper mx204
141 Juniper mx5
142 Juniper ptx1000
143 Juniper ptx1000-72q
144 Juniper ptx10000
145 Juniper ptx10001
146 Juniper ptx10001-36mr
147 Juniper ptx100016
148 Juniper ptx10002
149 Juniper ptx10002-60c
150 Juniper ptx10003
151 Juniper ptx10003_160c
152 Juniper ptx10003_80c
153 Juniper ptx10003_81cd
154 Juniper ptx10004
155 Juniper ptx10008
156 Juniper ptx10016
157 Juniper ptx3000
158 Juniper ptx5000
159 Juniper t1600
160 Juniper t320
161 Juniper t4000
162 Juniper t640
163 Juniper qfx10000
164 Juniper qfx3500
165 Juniper qfx5100
166 Juniper qfx10002
167 Juniper qfx3600
168 Juniper qfx5200
169 Juniper qfx5110
170 Juniper qfx10008
171 Juniper qfx10016
172 Juniper nfx250
173 Juniper acx5000
174 Juniper xre200
175 Juniper ex_rps
176 Juniper nfx
177 Juniper junos
178 Juniper nfx150
179 Juniper qfx3000-g
180 Juniper qfx3000-m
181 Juniper ocx1100
182 Juniper qfx5120
183 Juniper qfx5210
184 Juniper qfx10002-32q
185 Juniper qfx10002-60c
186 Juniper qfx10002-72q
187 Juniper atp400
188 Juniper atp700
189 Juniper gfx3600
190 Juniper qfx5200-32c
191 Juniper qfx5200-48y
192 Juniper qfx5210-64c
193 Juniper acx1000
194 Juniper acx1100
195 Juniper acx2000
196 Juniper acx2100
197 Juniper acx2200
198 Juniper acx4000
199 Juniper acx500
200 Juniper acx5048
201 Juniper acx5096
202 Juniper acx5448
203 Juniper acx6360
204 Juniper csrx
205 Juniper qfx3008-i
206 Juniper qfx3100
207 Juniper qfx3600-i
208 Juniper qfx5220
209 Juniper qfx5130
210 Juniper nfx350
211 Juniper acx710
212 Juniper qfx5100-96s
213 Juniper acx5800
214 Juniper acx5400
215 Juniper acx6300
216 Juniper ctp150
217 Juniper ctp2008
218 Juniper ctp2024
219 Juniper ctp2056
220 Juniper jatp
221 Juniper ln1000
222 Juniper ln2600
223 Juniper m10i
224 Juniper m120
225 Juniper m320
226 Juniper m7i
227 Juniper router_m10
228 Juniper router_m16
229 Juniper router_m20
230 Juniper router_m40
231 Juniper router_m5
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-0289.

URL Resource
https://kb.juniper.net/JSA11191 Vendor Advisory
https://kb.juniper.net/JSA11191 Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-0289 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-0289 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://kb.juniper.net/JSA11191
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Jul. 28, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:A/AC:M/Au:N/C:N/I:N/A:P)
    Added CVSS V3.1 NIST AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type https://kb.juniper.net/JSA11191 No Types Assigned https://kb.juniper.net/JSA11191 Vendor Advisory
    Added CWE NIST CWE-367
    Added CPE Configuration AND OR *cpe:2.3:o:juniper:junos:5.6:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* versions from (including) 5.7 up to (excluding) 15.1 *cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* versions from (including) 15.2 up to (excluding) 18.4 *cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:* OR cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx2000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx5048:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx5096:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx5448:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx6300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx6360:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:acx710:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:atp400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:atp700:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ctp150:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ctp2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ctp2024:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ctp2056:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:dx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:dx:5.1:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4550\/vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex_rps:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:fips_infranet_controller_6500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:fips_secure_access_4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:fips_secure_access_4500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:fips_secure_access_6000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:fips_secure_access_6500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:gfx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:idp250:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:idp75:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:idp800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:idp8200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:infranet_controller_4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:infranet_controller_4500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:infranet_controller_6000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:infranet_controller_6500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:jatp:400:*:*:*:*:*:*:* cpe:2.3:h:juniper:jatp:700:*:*:*:*:*:*:* cpe:2.3:h:juniper:junos:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:junos_space_ja1500_appliance:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:junos_space_ja2500_appliance:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ln1000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ln2600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:m10i:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:m120:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:m320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:m7i:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mag2600_gateway:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mag4610_gateway:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mag6610_gateway:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mag6611_gateway:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-5200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-5gt:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-idp_10:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-idp_100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-idp_1000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:netscreen-idp_500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:nfx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:nfx350:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:nsm3000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:nsmexpress:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ocx1100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx1000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx1000-72q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10001:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10001-36mr:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx100016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10002:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10002-60c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003_160c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003_80c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10003_81cd:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10004:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx3000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ptx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10002-32q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10002-60c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10002-72q:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx3000-g:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx3000-m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx3008-i:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx3100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx3600-i:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5100-96s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5200-32c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5200-48y:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5210-64c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:router_m10:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:router_m16:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:router_m20:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:router_m40:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:router_m5:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:secure_access_2000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:secure_access_2500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:secure_access_4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:secure_access_4500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:secure_access_6000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:secure_access_6500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:secure_access_700:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:t1600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:t320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:t4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:t640:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:xre200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* *cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:* OR cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Jul. 15, 2021

    Action Type Old Value New Value
    Changed Description When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved. When user-defined ARP Policer is configured and applied on one or more Aggregated Ethernet (AE) interface units, a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability between the Device Control Daemon (DCD) and firewall process (dfwd) daemons of Juniper Networks Junos OS allows an attacker to bypass the user-defined ARP Policer. In this particular case the User ARP policer is replaced with default ARP policer. To review the desired ARP Policers and actual state one can run the command "show interfaces <> extensive" and review the output. See further details below. An example output is: show interfaces extensive | match policer Policer: Input: __default_arp_policer__ <<< incorrect if user ARP Policer was applied on an AE interface and the default ARP Policer is displayed Policer: Input: jtac-arp-ae5.317-inet-arp <<< correct if user ARP Policer was applied on an AE interface For all platforms, except SRX Series: This issue affects Juniper Networks Junos OS: All versions 5.6R1 and all later versions prior to 18.4 versions prior to 18.4R2-S9, 18.4R3-S9 with the exception of 15.1 versions 15.1R7-S10 and later versions; 19.4 versions prior to 19.4R3-S3; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; This issue does not affect Juniper Networks Junos OS versions prior to 5.6R1. On SRX Series this issue affects Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.4 versions prior to 19.4R3-S4; 20.1 versions prior to 20.1R3; 20.2 versions prior to 20.2R3-S2; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. This issue does not affect 18.4 versions prior to 18.4R1 on SRX Series. This issue does not affect Junos OS Evolved.
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-0289 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-0289 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.06 }} 0.01%

score

0.23101

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability