An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane.
When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesnt consider existing connections anymore for subsequent connection attempts so that the connection limit can be exceeded. This issue affects Junos OS Evolved:
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Junos_os_evolved | Juniper | * | 21.4 (excluding) |
Junos_os_evolved | Juniper | 21.4 (including) | 21.4 (including) |
Junos_os_evolved | Juniper | 21.4-r1 (including) | 21.4-r1 (including) |
Junos_os_evolved | Juniper | 21.4-r1-s1 (including) | 21.4-r1-s1 (including) |
Junos_os_evolved | Juniper | 21.4-r1-s2 (including) | 21.4-r1-s2 (including) |
Junos_os_evolved | Juniper | 21.4-r2 (including) | 21.4-r2 (including) |
Junos_os_evolved | Juniper | 21.4-r2-s1 (including) | 21.4-r2-s1 (including) |
Junos_os_evolved | Juniper | 21.4-r2-s2 (including) | 21.4-r2-s2 (including) |
Junos_os_evolved | Juniper | 21.4-r3 (including) | 21.4-r3 (including) |
Junos_os_evolved | Juniper | 21.4-r3-s1 (including) | 21.4-r3-s1 (including) |
Junos_os_evolved | Juniper | 21.4-r3-s2 (including) | 21.4-r3-s2 (including) |
Junos_os_evolved | Juniper | 21.4-r3-s3 (including) | 21.4-r3-s3 (including) |
Junos_os_evolved | Juniper | 22.1 (including) | 22.1 (including) |
Junos_os_evolved | Juniper | 22.1-r1 (including) | 22.1-r1 (including) |
Junos_os_evolved | Juniper | 22.1-r1-s1 (including) | 22.1-r1-s1 (including) |
Junos_os_evolved | Juniper | 22.1-r1-s2 (including) | 22.1-r1-s2 (including) |
Junos_os_evolved | Juniper | 22.1-r2 (including) | 22.1-r2 (including) |
Junos_os_evolved | Juniper | 22.1-r2-s1 (including) | 22.1-r2-s1 (including) |
Junos_os_evolved | Juniper | 22.1-r3 (including) | 22.1-r3 (including) |
Junos_os_evolved | Juniper | 22.1-r3-s1 (including) | 22.1-r3-s1 (including) |
Junos_os_evolved | Juniper | 22.1-r3-s2 (including) | 22.1-r3-s2 (including) |
Junos_os_evolved | Juniper | 22.2 (including) | 22.2 (including) |
Junos_os_evolved | Juniper | 22.2-r1 (including) | 22.2-r1 (including) |
Junos_os_evolved | Juniper | 22.2-r1-s1 (including) | 22.2-r1-s1 (including) |
Junos_os_evolved | Juniper | 22.2-r1-s2 (including) | 22.2-r1-s2 (including) |
Junos_os_evolved | Juniper | 22.2-r2 (including) | 22.2-r2 (including) |
Junos_os_evolved | Juniper | 22.2-r2-s1 (including) | 22.2-r2-s1 (including) |
Junos_os_evolved | Juniper | 22.2-r2-s2 (including) | 22.2-r2-s2 (including) |
Junos_os_evolved | Juniper | 22.2-r3 (including) | 22.2-r3 (including) |
Junos_os_evolved | Juniper | 22.2-r3-s1 (including) | 22.2-r3-s1 (including) |
Junos_os_evolved | Juniper | 22.3 (including) | 22.3 (including) |
Junos_os_evolved | Juniper | 22.3-r1 (including) | 22.3-r1 (including) |
Junos_os_evolved | Juniper | 22.3-r1-s1 (including) | 22.3-r1-s1 (including) |
Junos_os_evolved | Juniper | 22.3-r1-s2 (including) | 22.3-r1-s2 (including) |
Junos_os_evolved | Juniper | 22.3-r2 (including) | 22.3-r2 (including) |
Common protection mechanisms include:
Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].
Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]