CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L
AI Score
Confidence
High
EPSS
Percentile
17.7%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a
Denial-of-Service (DoS).
If an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage.
This issue affects Junos OS:
This issue does not affect Junos OS versions earlier than 21.4.
[
{
"vendor": "Juniper Networks",
"product": "Junos OS",
"versions": [
{
"status": "affected",
"version": "21.4R3",
"lessThan": "21.4R3-S5",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.1R3",
"lessThan": "22.1R3-S4",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.2R2",
"lessThan": "22.2R3",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.3R1",
"lessThan": "22.3R2-S2, 22.3R3",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.4R1",
"lessThan": "22.4R2",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "0",
"lessThan": "21.4",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
[
{
"cpes": [
"cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*"
],
"vendor": "juniper",
"product": "junos_os",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "21.4",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.4r1",
"lessThan": "22.4r2",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.3r1",
"lessThan": "22.3r2-s2",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.3r1",
"lessThan": "22.3r3",
"versionType": "custom"
},
{
"status": "affected",
"version": "22.2r2",
"lessThan": "22.2r3",
"versionType": "semver"
},
{
"status": "affected",
"version": "22.1r3",
"lessThan": "22.1r3-s4",
"versionType": "semver"
},
{
"status": "affected",
"version": "21.4r3",
"lessThan": "21.4r3-s5",
"versionType": "semver"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L
AI Score
Confidence
High
EPSS
Percentile
17.7%
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial