Lucene search

K
cve[email protected]CVE-2024-21595
HistoryJan 12, 2024 - 1:15 a.m.

CVE-2024-21595

2024-01-1201:15:47
CWE-1286
web.nvd.nist.gov
13
cve-2024-21595
juniper networks
junos os
vulnerability
packet forwarding engine
pfe
denial of service
dos
ex4100
ex4400
ex4600
qfx5000
vxlan
icmp
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.8%

An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).

If an attacker sends high rate of specific ICMP traffic to a device with VXLAN configured, this causes a deadlock of the PFE and results in the device becoming unresponsive. A manual restart will be required to recover the device.

This issue only affects EX4100, EX4400, EX4600, QFX5000 Series devices.

This issue affects:

Juniper Networks Junos OS

  • 21.4R3 versions earlier than 21.4R3-S4;
  • 22.1R3 versions earlier than 22.1R3-S3;
  • 22.2R2 versions earlier than 22.2R3-S1;
  • 22.3 versions earlier than 22.3R2-S2, 22.3R3;
  • 22.4 versions earlier than 22.4R2;
  • 23.1 versions earlier than 23.1R2.

Affected configurations

NVD
Node
juniperjunosMatch21.4r3
OR
juniperjunosMatch21.4r3-s1
OR
juniperjunosMatch21.4r3-s2
OR
juniperjunosMatch21.4r3-s3
OR
juniperjunosMatch22.1r3
OR
juniperjunosMatch22.1r3-s1
OR
juniperjunosMatch22.1r3-s2
OR
juniperjunosMatch22.2r2
OR
juniperjunosMatch22.2r2-s1
OR
juniperjunosMatch22.2r2-s2
OR
juniperjunosMatch22.2r3
OR
juniperjunosMatch22.3-
OR
juniperjunosMatch22.3r1
OR
juniperjunosMatch22.3r1-s1
OR
juniperjunosMatch22.3r1-s2
OR
juniperjunosMatch22.3r2
OR
juniperjunosMatch22.3r2-s1
OR
juniperjunosMatch22.4-
OR
juniperjunosMatch22.4r1
OR
juniperjunosMatch22.4r1-s1
OR
juniperjunosMatch22.4r1-s2
OR
juniperjunosMatch23.1r1
AND
juniperex4100Match-
OR
juniperex4400Match-
OR
juniperex4600Match-
OR
juniperqfx5100Match-
OR
juniperqfx5100-96sMatch-
OR
juniperqfx5110Match-
OR
juniperqfx5120Match-
OR
juniperqfx5130Match-
OR
juniperqfx5200Match-
OR
juniperqfx5200-32cMatch-
OR
juniperqfx5200-48yMatch-
OR
juniperqfx5210Match-
OR
juniperqfx5210-64cMatch-
OR
juniperqfx5220Match-
OR
juniperqfx5700Match-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "EX4100",
      "EX4400",
      "EX4600",
      "QFX5000 Series"
    ],
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "21.4R3-S4",
        "status": "affected",
        "version": "21.4R3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.1R3-S3",
        "status": "affected",
        "version": "22.1R3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R3-S1",
        "status": "affected",
        "version": "22.2R2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R2-S2, 22.3R3",
        "status": "affected",
        "version": "22.3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.4R2",
        "status": "affected",
        "version": "22.4",
        "versionType": "semver"
      },
      {
        "lessThan": "23.1R2",
        "status": "affected",
        "version": "23.1",
        "versionType": "semver"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

20.8%

Related for CVE-2024-21595