Vulnerability Description
On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS instance or a Bridge-Domain, certain Layer 2 network events at Customer Edge (CE) devices may cause memory leaks in the MPC of Provider Edge (PE) devices which can cause an out of memory condition and MPC restart. When this issue occurs, there will be temporary traffic interruption until the MPC is restored. An administrator can use the following CLI command to monitor the status of memory usage level of the MPC: user@device> show system resource-monitor fpc FPC Resource Usage Summary Free Heap Mem Watermark : 20 % Free NH Mem Watermark : 20 % Free Filter Mem Watermark : 20 % * - Watermark reached Slot # % Heap Free RTT Average RTT 1 87 PFE # % ENCAP mem Free % NH mem Free % FW mem Free 0 NA 88 99 1 NA 89 99 When the issue is occurring, the value of “% NH mem Free” will go down until the MPC restarts. This issue affects MX Series and EX9200 Series with Trio-based PFEs (Packet Forwarding Engines), including MX-MPC1-3D, MX-MPC1E-3D, MX-MPC2-3D, MX-MPC2E-3D, MPC-3D-16XGE, and CHAS-MXxx Series MPCs. No other products or platforms are affected by this issue. This issue affects Juniper Networks Junos OS on MX Series, EX9200 Series: 17.3 versions prior to 17.3R3-S10; 17.4 versions prior to 17.4R3-S3; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.2 versions prior to 19.2R3-S2; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.2 versions prior to 20.2R1-S3, 20.2R2; 20.3 versions prior to 20.3R1-S1,, 20.3R2. This issue does not affect Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 17.4 versions prior to 17.4R3-S2; 18.1; 18.2 versions prior to 18.2R3-S4; 18.3 versions prior to 18.3R3-S2; 18.4 versions prior to 18.4R3-S1; 19.1; 19.2 versions prior to 19.2R2; 19.3 versions prior to 19.3R3; 19.4 versions prior to 19.4R2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 17.3 |
| Juniper | Ex9200 | - |
| Juniper | Mx10 | - |
| Juniper | Mx10003 | - |
| Juniper | Mx10008 | - |
| Juniper | Mx10016 | - |
| Juniper | Mx104 | - |
| Juniper | Mx150 | - |
| Juniper | Mx2008 | - |
| Juniper | Mx2010 | - |
| Juniper | Mx2020 | - |
| Juniper | Mx204 | - |
| Juniper | Mx240 | - |
| Juniper | Mx40 | - |
| Juniper | Mx480 | - |
| Juniper | Mx5 | - |
| Juniper | Mx80 | - |
| Juniper | Mx960 | - |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA11148Vendor Advisory
- https://kb.juniper.net/JSA11148Vendor Advisory
FAQ
What is CVE-2021-0257?
CVE-2021-0257 is a vulnerability with a CVSS score of 6.5 (MEDIUM). On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPCs (Modular Port Concentrators) where Integrated Routing and Bridging (IRB) interfaces are configured and mapped to a VPLS i...
How severe is CVE-2021-0257?
CVE-2021-0257 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-0257?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Ex9200, Juniper Mx10, Juniper Mx10003, Juniper Mx10008.