Lucene search

K
vulnrichmentJuniperVULNRICHMENT:CVE-2024-39530
HistoryJul 11, 2024 - 4:04 p.m.

CVE-2024-39530 Junos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash

2024-07-1116:04:13
CWE-754
juniper
github.com
5
junos os
unauthenticated
chassisd
crash
dos
grpc
netconf
sensor
vulnerability
denial-of-service
juniper networks
fpcs
outage
cve-2024-39530
22.1r3-s4
22.3r2-s2

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

AI Score

7

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a

Denial-of-Service (DoS).

If an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage.

This issue affects Junos OS:

  • 21.4 versions from 21.4R3 before 21.4R3-S5,
  • 22.1 versions from 22.1R3 before 22.1R3-S4,
  • 22.2 versions from 22.2R2 before 22.2R3,
  • 22.3 versions from 22.3R1 before 22.3R2-S2, 22.3R3,
  • 22.4 versions from 22.4R1 before 22.4R2.

This issue does not affect Junos OS versions earlier than 21.4.

CNA Affected

[
  {
    "vendor": "Juniper Networks",
    "product": "Junos OS",
    "versions": [
      {
        "status": "affected",
        "version": "21.4R3",
        "lessThan": "21.4R3-S5",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.1R3",
        "lessThan": "22.1R3-S4",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.2R2",
        "lessThan": "22.2R3",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.3R1",
        "lessThan": "22.3R2-S2, 22.3R3",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.4R1",
        "lessThan": "22.4R2",
        "versionType": "semver"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "21.4",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos_os",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "21.4",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.4r1",
        "lessThan": "22.4r2",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.3r1",
        "lessThan": "22.3r2-s2",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.3r1",
        "lessThan": "22.3r3",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "22.2r2",
        "lessThan": "22.2r3",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.1r3",
        "lessThan": "22.1r3-s4",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "21.4r3",
        "lessThan": "21.4r3-s5",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

AI Score

7

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-39530