Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-31386

A Protection Mechanism Failure vulnerability in the J-Web HTTP service of Juniper Networks Junos OS allows a remote unauthenticated attacker to perform Person-in-the-Middle (PitM) attacks against the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S20; 15.1 versions prior to 15.1R7-S11; 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R3-S4; 19.3 versions prior to 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 36.0%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 2.6
Products affected by CVE-2021-31386
  • Juniper » Junos » Version: 12.3
    cpe:2.3:o:juniper:junos:12.3
  • Juniper » Junos » Version: 15.1
    cpe:2.3:o:juniper:junos:15.1
  • Juniper » Junos » Version: 18.3
    cpe:2.3:o:juniper:junos:18.3
  • Juniper » Junos » Version: 18.4
    cpe:2.3:o:juniper:junos:18.4
  • Juniper » Junos » Version: 19.1
    cpe:2.3:o:juniper:junos:19.1
  • Juniper » Junos » Version: 19.2
    cpe:2.3:o:juniper:junos:19.2
  • Juniper » Junos » Version: 19.3
    cpe:2.3:o:juniper:junos:19.3
  • Juniper » Junos » Version: 19.4
    cpe:2.3:o:juniper:junos:19.4
  • Juniper » Junos » Version: 20.1
    cpe:2.3:o:juniper:junos:20.1
  • Juniper » Junos » Version: 20.2
    cpe:2.3:o:juniper:junos:20.2
  • Juniper » Junos » Version: 20.3
    cpe:2.3:o:juniper:junos:20.3
  • Juniper » Junos » Version: 20.4
    cpe:2.3:o:juniper:junos:20.4
  • Juniper » Junos » Version: 21.1
    cpe:2.3:o:juniper:junos:21.1
  • Juniper » Junos » Version: 21.2
    cpe:2.3:o:juniper:junos:21.2


Contact Us

Shodan ® - All rights reserved