Lucene search

K
prionPRIOn knowledge basePRION:CVE-2024-21595
HistoryJan 12, 2024 - 1:15 a.m.

Input validation

2024-01-1201:15:00
PRIOn knowledge base
www.prio-n.com
6
dos vulnerability
packet forwarding engine
juniper networks junos os
network-based attack
ex4100
ex4400
ex4600
qfx5000 series
vxlan configuration
specific icmp traffic
nvd

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.5%

An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).

If an attacker sends high rate of specific ICMP traffic to a device with VXLAN configured, this causes a deadlock of the PFE and results in the device becoming unresponsive. A manual restart will be required to recover the device.

This issue only affects EX4100, EX4400, EX4600, QFX5000 Series devices.

This issue affects:

Juniper Networks Junos OS

  • 21.4R3 versions earlier than 21.4R3-S4;
  • 22.1R3 versions earlier than 22.1R3-S3;
  • 22.2R2 versions earlier than 22.2R3-S1;
  • 22.3 versions earlier than 22.3R2-S2, 22.3R3;
  • 22.4 versions earlier than 22.4R2;
  • 23.1 versions earlier than 23.1R2.
Rows per page:
1-10 of 221

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.5%

Related for PRION:CVE-2024-21595