Vulnerability Description
A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; 8.6.0 versions prior to 8.6.0R4.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Steel-Belted Radius Carrier | 8.4.1 |
Related Weaknesses (CWE)
References
- https://kb.juniper.net/JSA11180Vendor Advisory
- https://kb.juniper.net/JSA11180Vendor Advisory
FAQ
What is CVE-2021-0276?
CVE-2021-0276 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing...
How severe is CVE-2021-0276?
CVE-2021-0276 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-0276?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Steel-Belted Radius Carrier.