CVE-2021-0226
HIGHJuniper Networks Junos OS Evolved <19.4R2-S3-EVO, <20.1 - DoS
Title source: llmDescription
On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue does not affect IPv4 BGP sessions. This issue affects IBGP or EBGP peer sessions with IPv6. This issue affects: Juniper Networks Junos OS Evolved: 19.4 versions prior to 19.4R2-S3-EVO; 20.1 versions prior to 20.1R2-S3-EVO; 20.2 versions prior to 20.2R2-S1-EVO; 20.3 versions prior to 20.3R2-EVO. This issue does not affect Juniper Networks Junos OS releases.
References (1)
Scores
CVSS v3
7.1
EPSS
0.0054
EPSS Percentile
67.6%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Details
CWE
CWE-665
Status
published
Products (3)
juniper/junos_os_evolved
20.1 r1 (5 CPE variants)
juniper/junos_os_evolved
20.2 r1 (3 CPE variants)
juniper/junos_os_evolved
20.3 r1 (2 CPE variants)
Published
Apr 22, 2021
Tracked Since
Feb 18, 2026