Steel-Belted Radius Carrier Edition: Remote code execution vulnerability when EAP Authentication is configured.
CVE-2021-0276

9.8CRITICAL

Key Information:

Vendor
CVE Published:
15 July 2021

Badges

👾 Exploit Exists

Summary

A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; 8.6.0 versions prior to 8.6.0R4.

Affected Version(s)

SBR Carrier 8.4.1 < 8.4.1R19

SBR Carrier 8.5.0 < 8.5.0R10

SBR Carrier 8.6.0 < 8.6.0R4

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.