Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-0205

When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpected traffic. This issue affects only IPv6 prefixes when used as source and destination. This issue affects MX Series devices using MS-MPC, MS-MIC or MS-SPC3 service cards with IDS service configured. This issue affects: Juniper Networks Junos OS 17.3 versions prior to 17.3R3-S10 on MX Series; 17.4 versions prior to 17.4R3-S3 on MX Series; 18.1 versions prior to 18.1R3-S11 on MX Series; 18.2 versions prior to 18.2R3-S6 on MX Series; 18.3 versions prior to 18.3R3-S4 on MX Series; 18.4 versions prior to 18.4R3-S6 on MX Series; 19.1 versions prior to 19.1R2-S2, 19.1R3-S3 on MX Series; 19.2 versions prior to 19.2R3-S1 on MX Series; 19.3 versions prior to 19.3R2-S5, 19.3R3-S1 on MX Series; 19.4 versions prior to 19.4R3 on MX Series; 20.1 versions prior to 20.1R2 on MX Series; 20.2 versions prior to 20.2R2 on MX Series;
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 45.7%
CVSS Severity
CVSS v3 Score 5.8
CVSS v2 Score 4.3
Products affected by CVE-2021-0205
  • Juniper » Mx10000 » Version: N/A
    cpe:2.3:h:juniper:mx10000:-
  • Juniper » Mx10003 » Version: N/A
    cpe:2.3:h:juniper:mx10003:-
  • Juniper » Mx104 » Version: N/A
    cpe:2.3:h:juniper:mx104:-
  • Juniper » Mx10 » Version: N/A
    cpe:2.3:h:juniper:mx10:-
  • Juniper » Mx150 » Version: N/A
    cpe:2.3:h:juniper:mx150:-
  • Juniper » Mx2008 » Version: N/A
    cpe:2.3:h:juniper:mx2008:-
  • Juniper » Mx2010 » Version: N/A
    cpe:2.3:h:juniper:mx2010:-
  • Juniper » Mx2020 » Version: N/A
    cpe:2.3:h:juniper:mx2020:-
  • Juniper » Mx204 » Version: N/A
    cpe:2.3:h:juniper:mx204:-
  • Juniper » Mx240 » Version: N/A
    cpe:2.3:h:juniper:mx240:-
  • Juniper » Mx40 » Version: N/A
    cpe:2.3:h:juniper:mx40:-
  • Juniper » Mx480 » Version: N/A
    cpe:2.3:h:juniper:mx480:-
  • Juniper » Mx5 » Version: N/A
    cpe:2.3:h:juniper:mx5:-
  • Juniper » Mx80 » Version: N/A
    cpe:2.3:h:juniper:mx80:-
  • Juniper » Mx960 » Version: N/A
    cpe:2.3:h:juniper:mx960:-
  • Juniper » Junos » Version: 17.3
    cpe:2.3:o:juniper:junos:17.3
  • Juniper » Junos » Version: 17.4
    cpe:2.3:o:juniper:junos:17.4
  • Juniper » Junos » Version: 18.1
    cpe:2.3:o:juniper:junos:18.1
  • Juniper » Junos » Version: 18.2
    cpe:2.3:o:juniper:junos:18.2
  • Juniper » Junos » Version: 18.3
    cpe:2.3:o:juniper:junos:18.3
  • Juniper » Junos » Version: 18.4
    cpe:2.3:o:juniper:junos:18.4
  • Juniper » Junos » Version: 19.1
    cpe:2.3:o:juniper:junos:19.1
  • Juniper » Junos » Version: 19.2
    cpe:2.3:o:juniper:junos:19.2
  • Juniper » Junos » Version: 19.3
    cpe:2.3:o:juniper:junos:19.3
  • Juniper » Junos » Version: 19.4
    cpe:2.3:o:juniper:junos:19.4
  • Juniper » Junos » Version: 20.1
    cpe:2.3:o:juniper:junos:20.1
  • Juniper » Junos » Version: 20.2
    cpe:2.3:o:juniper:junos:20.2


Contact Us

Shodan ® - All rights reserved