{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T11:17:49.412","vulnerabilities":[{"cve":{"id":"CVE-2021-0267","sourceIdentifier":"sirt@juniper.net","published":"2021-04-22T20:15:09.910","lastModified":"2024-11-21T05:42:21.583","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An Improper Input Validation vulnerability in the active-lease query portion in JDHCPD's DHCP Relay Agent of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending a crafted DHCP packet to the device thereby crashing the jdhcpd DHCP service. This is typically configured for Broadband Subscriber Sessions. Continued receipt and processing of this crafted packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R3; 20.3 versions prior to 20.3R2. This issue does not affect Junos OS Evolved."},{"lang":"es","value":"Una vulnerabilidad de Comprobación de Entrada Inapropiada en una porción de consulta active-lease en DHCP Relay Agent de JDHCPD de Juniper Networks Junos OS, permite a un atacante causar una Denegación de Servicio (DoS) mediante el envío de un paquete DHCP diseñado hacia el dispositivo, lo que bloquea el servicio DHCP jdhcpd.&#xa0;Por lo general, se configura para Broadband Subscriber Sessions.&#xa0;La recepción y el procesamiento continuo de este paquete diseñado creará una condición sostenida de Denegación de Servicio (DoS).&#xa0;Este problema afecta a Juniper Networks Junos OS: versiones 19.4 anteriores a 19.4R3-S1;&#xa0;versiones 20.1 anteriores a 20.1R2-S1, 20.1R3;&#xa0;20.2 versiones anteriores a 20.2R3;&#xa0;20.3 versiones anteriores a 20.3R2.&#xa0;Este problema no afecta a Junos OS Evolved"}],"metrics":{"cvssMetricV31":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:N/A:P","baseScore":3.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":6.5,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"sirt@juniper.net","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*","matchCriteriaId":"DC743EE4-8833-452A-94DB-655BF139F883"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*","matchCriteriaId":"FE96A8EA-FFE3-4D8F-9266-21899149D634"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*","matchCriteriaId":"C12A75C6-2D00-4202-B861-00FF71585FA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*","matchCriteriaId":"4DCFA774-96EF-4018-82CF-95C807025C24"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*","matchCriteriaId":"76022948-4B07-43CB-824C-44E1AB3537CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*","matchCriteriaId":"25446F60-5CB9-4923-BCE8-609AE3CFDFBC"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*","matchCriteriaId":"758275F3-9457-45A2-8F57-65DCD659FC1B"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*","matchCriteriaId":"8328FDE6-9707-4142-B905-3B07C0E28E35"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*","matchCriteriaId":"41CD982F-E6F2-4951-9F96-A76C142DF08E"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*","matchCriteriaId":"19FDC05F-5582-4F7E-B628-E58A3C0E7F2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*","matchCriteriaId":"401306D1-E9CE-49C6-8DC9-0E8747B9DC2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*","matchCriteriaId":"615EAF48-AD53-4CC2-B233-5EA5C0F72CB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*","matchCriteriaId":"DC8E7547-6649-436D-BC45-184417680C72"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*","matchCriteriaId":"CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*","matchCriteriaId":"D3C23AEB-34DE-44FB-8D64-E69D6E8B7401"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*","matchCriteriaId":"18DB9401-5A51-4BB3-AC2F-58F58F1C788C"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*","matchCriteriaId":"06F53DA5-59AE-403C-9B1E-41CE267D8BB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*","matchCriteriaId":"3332262F-81DA-4D78-99C9-514CADA46611"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*","matchCriteriaId":"B46B63A2-1518-4A29-940C-F05624C9658D"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*","matchCriteriaId":"8E0D4959-3865-42A7-98CD-1103EBD84528"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*","matchCriteriaId":"3A58292B-814C-49E7-8D6D-BE26EFB9ADDF"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*","matchCriteriaId":"5C9BC697-C7C9-447D-9EBD-E9711462583E"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*","matchCriteriaId":"7B80433B-57B1-49EF-B1A1-83781D6102E3"}]}]}],"references":[{"url":"https://kb.juniper.net/JSA11158","source":"sirt@juniper.net","tags":["Vendor Advisory"]},{"url":"https://www.juniper.net/documentation/us/en/software/junos/subscriber-mgmt-sessions/topics/ref/statement/active-leasequery-edit-forwarding-options.html","source":"sirt@juniper.net","tags":["Vendor Advisory"]},{"url":"https://kb.juniper.net/JSA11158","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.juniper.net/documentation/us/en/software/junos/subscriber-mgmt-sessions/topics/ref/statement/active-leasequery-edit-forwarding-options.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}