CVE-2024-30397 – Junos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (IKE) process
https://notcve.org/view.php?id=CVE-2024-30397
An Improper Check for Unusual or Exceptional Conditions vulnerability in the the Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS). The pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail. This CPU utilization of pkid can be checked using this command: root@srx> show system processes extensive | match pkid xxxxx root 103 0 846M 136M CPU1 1 569:00 100.00% pkid This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S10; * 21.2 versions prior to 21.2R3-S7; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2. Una vulnerabilidad de verificación inadecuada de condiciones inusuales o excepcionales en el daemon de infraestructura de clave pública (pkid) de Juniper Networks Junos OS permite que un atacante en red no autenticado provoque una denegación de servicio (DoS). El pkid es responsable de la verificación del certificado. • https://supportportal.juniper.net/JSA79179 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2024-30386 – Junos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash
https://notcve.org/view.php?id=CVE-2024-30386
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state updates are received and processed by the affected system, the correct order of some processing steps is not ensured, which can lead to an l2ald crash and restart. Whether the crash occurs depends on system internal timing which is outside the attackers control. This issue affects: Junos OS: * All versions before 20.4R3-S8, * 21.2 versions before 21.2R3-S6, * 21.3 versions before 21.3R3-S5, * 21.4 versions before 21.4R3-S4, * 22.1 versions before 22.1R3-S3, * 22.2 versions before 22.2R3-S1, * 22.3 versions before 22.3R3,, * 22.4 versions before 22.4R2; Junos OS Evolved: * All versions before 20.4R3-S8-EVO, * 21.2-EVO versions before 21.2R3-S6-EVO, * 21.3-EVO versions before 21.3R3-S5-EVO, * 21.4-EVO versions before 21.4R3-S4-EVO, * 22.1-EVO versions before 22.1R3-S3-EVO, * 22.2-EVO versions before 22.2R3-S1-EVO, * 22.3-EVO versions before 22.3R3-EVO, * 22.4-EVO versions before 22.4R2-EVO. Una vulnerabilidad de Use-After-Free en el daemon de aprendizaje de direcciones de capa 2 (l2ald) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque que l2ald falle, lo que provoca una denegación de servicio (DoS). En un escenario EVPN-VXLAN, cuando el sistema afectado recibe y procesa actualizaciones de estado, no se garantiza el orden correcto de algunos pasos de procesamiento, lo que puede provocar un bloqueo y reinicio de l2ald. Que se produzca el fallo depende de la sincronización interna del sistema, que está fuera del control de los atacantes. • http://supportportal.juniper.net/JSA79184 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-416: Use After Free •
CVE-2024-30384 – Junos OS: EX4300 Series: If a specific CLI command is issued PFE crashes will occur
https://notcve.org/view.php?id=CVE-2024-30384
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows a locally authenticated attacker with low privileges to cause a Denial-of-Service (Dos). If a specific CLI command is issued, a PFE crash will occur. This will cause traffic forwarding to be interrupted until the system self-recovers. This issue affects Junos OS: All versions before 20.4R3-S10, 21.2 versions before 21.2R3-S7, 21.4 versions before 21.4R3-S6. Una verificación inadecuada de la vulnerabilidad de condiciones inusuales o excepcionales en el motor de reenvío de paquetes (PFE) de Juniper Networks Junos OS en la serie EX4300 permite que un atacante autenticado localmente con privilegios bajos provoque una denegación de servicio (DOS). Si se emite un comando CLI específico, se producirá un bloqueo de PFE. Esto provocará que el reenvío de tráfico se interrumpa hasta que el sistema se recupere automáticamente. • http://supportportal.juniper.net/JSA79186 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2024-30382 – Junos OS and Junos OS Evolved: RPD crash when CoS-based forwarding (CBF) policy is configured
https://notcve.org/view.php?id=CVE-2024-30382
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS). This issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below). This issue affects: Junos OS: * all versions before 20.4R3-S10, * from 21.2 before 21.2R3-S8, * from 21.3 before 21.3R3, * from 21.4 before 21.4R3, * from 22.1 before 22.1R2; Junos OS Evolved: * all versions before 21.2R3-S8-EVO, * from 21.3 before 21.3R3-EVO, * from 21.4 before 21.4R3-EVO, * from 22.1 before 22.1R2-EVO. Una vulnerabilidad de manejo inadecuado de condiciones excepcionales en el daemon del protocolo de enrutamiento (rpd) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante no autenticado basado en la red envíe una actualización de enrutamiento específica, lo que provoca un núcleo rpd debido a la corrupción de la memoria, lo que lleva a una denegación de servicio (DoS). Este problema solo se puede desencadenar cuando el sistema está configurado para el reenvío basado en CoS (CBF) con un mapa de políticas que contiene una acción cos-next-hop-map (ver más abajo). Este problema afecta a: Junos OS: * todas las versiones anteriores a 20.4R3-S10, * desde 21.2 anterior a 21.2R3-S8, * desde 21.3 anterior a 21.3R3, * desde 21.4 anterior a 21.4R3, * desde 22.1 anterior a 22.1R2; Junos OS Evolved: * todas las versiones anteriores a 21.2R3-S8-EVO, * desde 21.3 anteriores a 21.3R3-EVO, * desde 21.4 anteriores a 21.4R3-EVO, * desde 22.1 anteriores a 22.1R2-EVO. • https://supportportal.juniper.net/JSA79174 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2024-30387 – Junos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash
https://notcve.org/view.php?id=CVE-2024-30387
A Missing Synchronization vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on ACX5448 and ACX710 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). If an interface flaps while the system gathers statistics on that interface, two processes simultaneously access a shared resource which leads to a PFE crash and restart. This issue affects Junos OS: * All versions before 20.4R3-S9, * 21.2 versions before 21.2R3-S5, * 21.3 versions before 21.3R3-S5, * 21.4 versions before 21.4R3-S4, * 22.1 versions before 22.1R3-S2, * 22.2 versions before 22.2R3-S2, * 22.3 versions before 22.3R2-S2, 22.3R3, * 22.4 versions before 22.4R2. Una vulnerabilidad de falta de sincronización en el motor de reenvío de paquetes (PFE) de Juniper Networks Junos OS en ACX5448 y ACX710 permite que un atacante adyacente no autenticado provoque una denegación de servicio (DoS). Si una interfaz parpadea mientras el sistema recopila estadísticas sobre esa interfaz, dos procesos acceden simultáneamente a un recurso compartido, lo que provoca un bloqueo y reinicio del PFE. Este problema afecta a Junos OS: todas las versiones anteriores a 20.4R3-S9, versiones 21.2 anteriores a 21.2R3-S5, versiones 21.3 anteriores a 21.3R3-S5, versiones 21.4 anteriores a 21.4R3-S4, versiones 22.1 anteriores a 22.1R3-S2, versiones 22.2 anteriores a 22.2 R3-S2, versiones 22.3 anteriores a 22.3R2-S2, 22.3R3, versiones 22.4 anteriores a 22.4R2. • http://supportportal.juniper.net/JSA79187 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-820: Missing Synchronization •