CVE-2021-0276

9.8 CRITICAL

📋 TL;DR

A stack-based buffer overflow vulnerability in Juniper Networks SBR Carrier with EAP authentication allows attackers to crash the RADIUS daemon, causing denial of service or potentially remote code execution. This affects Juniper SBR Carrier versions 8.4.1, 8.5.0, and 8.6.0 before specific patch releases. Organizations using these versions with EAP authentication configured are vulnerable.

💻 Affected Systems

Products:
  • Juniper Networks SBR Carrier
Versions: 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; 8.6.0 versions prior to 8.6.0R4
Operating Systems: Juniper SBR Carrier OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when EAP (Extensible Authentication Protocol) authentication is configured on the RADIUS daemon.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise and potential lateral movement within the network.

🟠

Likely Case

Sustained denial of service through repeated RADIUS daemon crashes, disrupting authentication services.

🟢

If Mitigated

Limited impact with proper network segmentation and intrusion prevention systems blocking malicious packets.

🌐 Internet-Facing: HIGH - RADIUS services are often exposed to untrusted networks for authentication, making them accessible to external attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but requires access to the network segment with RADIUS traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specific packets to the RADIUS service, which typically listens on UDP ports 1812/1813 or 1645/1646.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.4.1R19, 8.5.0R10, or 8.6.0R4

Vendor Advisory: https://kb.juniper.net/JSA11180

Restart Required: Yes

Instructions:

1. Download the appropriate patch version from Juniper support portal. 2. Backup current configuration. 3. Apply the patch following Juniper's upgrade procedures. 4. Restart the SBR Carrier system. 5. Verify the new version is running.

🔧 Temporary Workarounds

Disable EAP Authentication

all

Temporarily disable EAP authentication on the RADIUS daemon if not required for operations.

# Configuration commands vary by setup. Consult Juniper documentation for specific EAP disable commands.

Network Access Control

all

Restrict access to RADIUS ports (UDP 1812/1813, 1645/1646) to trusted sources only.

# Example firewall rule (syntax varies by firewall):
# deny udp any any eq 1812
# deny udp any any eq 1813
# permit udp trusted_networks any eq 1812
# permit udp trusted_networks any eq 1813

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RADIUS services from untrusted networks.
  • Deploy intrusion prevention systems (IPS) with signatures for buffer overflow attacks on RADIUS services.

🔍 How to Verify

Check if Vulnerable:

Check if running affected versions (8.4.1 < R19, 8.5.0 < R10, 8.6.0 < R4) with EAP authentication enabled. Use 'show version' command on SBR Carrier CLI.

Check Version:

show version

Verify Fix Applied:

Verify the version is 8.4.1R19, 8.5.0R10, or 8.6.0R4 or later using 'show version' command.

📡 Detection & Monitoring

Log Indicators:

  • RADIUS daemon crash logs
  • Unexpected process termination of radiusd
  • Authentication failures during attack

Network Indicators:

  • Unusual volume of RADIUS packets from single sources
  • Malformed RADIUS packets to UDP ports 1812/1813

SIEM Query:

source="radiusd" AND (event="crash" OR event="terminated") OR (destination_port IN (1812, 1813, 1645, 1646) AND packet_size > normal_threshold)

🔗 References

📤 Share & Export