{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T11:30:06.178","vulnerabilities":[{"cve":{"id":"CVE-2021-0209","sourceIdentifier":"sirt@juniper.net","published":"2021-01-15T18:15:15.027","lastModified":"2024-11-21T05:42:12.620","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS."},{"lang":"es","value":"En Juniper Networks Junos OS Evolved, un atacante que envía determinados paquetes de actualización de BGP válidos puede causar que Junos OS Evolved acceda a un puntero no inicializado, causando que RPD se convierta en el core conllevando a una Denegación de servicio (DoS).&#xa0;La recepción continua de estos tipos de paquetes de actualización de BGP válidos causará una condición de denegación de servicio extendida.&#xa0;RPD requerirá un reinicio para recuperarse.&#xa0;Un indicador de compromiso es visualizar si el archivo rpd.re existe al emitir el comando: show system core-dumps Este problema afecta a: Juniper Networks Junos OS Evolved versiones 19.4 anteriores a 19.4R2-S2-EVO;&#xa0;versiones 20.1 anteriores a 20.1R1-S2-EVO, 20.1R2-S1-EVO.&#xa0;Este problema no afecta a Junos OS"}],"metrics":{"cvssMetricV31":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:M/Au:N/C:N/I:N/A:C","baseScore":5.7,"accessVector":"ADJACENT_NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":5.5,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"sirt@juniper.net","type":"Secondary","description":[{"lang":"en","value":"CWE-824"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-824"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:19.4:r1:*:*:*:*:*:*","matchCriteriaId":"83447F3F-79A3-41DF-8FD1-31DCFCBE40A4"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:19.4:r2:*:*:*:*:*:*","matchCriteriaId":"2B14CED1-BEAF-4343-A05D-FB1E2B6AC955"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:19.4:r2-s1:*:*:*:*:*:*","matchCriteriaId":"ABB91C38-8C70-436A-83DB-42B8DF81D7D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:20.1:-:*:*:*:*:*:*","matchCriteriaId":"AED25FB6-E3FA-4543-90B2-50068D683D50"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*","matchCriteriaId":"F64FBB4B-7CBF-499B-A523-804857DEFAFA"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*","matchCriteriaId":"EEBE159F-5D94-4C18-B922-331586BEA2CA"}]}]}],"references":[{"url":"https://kb.juniper.net/JSA11099","source":"sirt@juniper.net","tags":["Vendor Advisory"]},{"url":"https://kb.juniper.net/JSA11099","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}