CVE-2024-30398 – Junos OS: SRX4600 Series - A high amount of specific traffic causes packet drops and an eventual PFE crash
https://notcve.org/view.php?id=CVE-2024-30398
An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a high amount of specific traffic is received on a SRX4600 device, due to an error in internal packet handling, a consistent rise in CPU memory utilization occurs. This results in packet drops in the traffic and eventually the PFE crashes. A manual reboot of the PFE will be required to restore the device to original state. This issue affects Junos OS: * 21.2 before 21.2R3-S7, * 21.4 before 21.4R3-S6, * 22.1 before 22.1R3-S5, * 22.2 before 22.2R3-S3, * 22.3 before 22.3R3-S2, * 22.4 before 22.4R3, * 23.2 before 23.2R1-S2, 23.2R2. Una restricción inadecuada de operaciones dentro de los límites de una vulnerabilidad de búfer de memoria en el motor de reenvío de paquetes (PFE) de Juniper Networks Junos OS permite que un atacante no autenticado basado en la red provoque una denegación de servicio (DoS). Cuando se recibe una gran cantidad de tráfico específico en un dispositivo SRX4600, debido a un error en el manejo de paquetes internos, se produce un aumento constante en la utilización de la memoria de la CPU. • https://supportportal.juniper.net/JSA79176 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2024-30397 – Junos OS: An invalid certificate causes a Denial of Service in the Internet Key Exchange (IKE) process
https://notcve.org/view.php?id=CVE-2024-30397
An Improper Check for Unusual or Exceptional Conditions vulnerability in the the Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS). The pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail. This CPU utilization of pkid can be checked using this command: root@srx> show system processes extensive | match pkid xxxxx root 103 0 846M 136M CPU1 1 569:00 100.00% pkid This issue affects: Juniper Networks Junos OS * All versions prior to 20.4R3-S10; * 21.2 versions prior to 21.2R3-S7; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S4; * 22.2 versions prior to 22.2R3-S3; * 22.3 versions prior to 22.3R3-S1; * 22.4 versions prior to 22.4R3; * 23.2 versions prior to 23.2R1-S2, 23.2R2. Una vulnerabilidad de verificación inadecuada de condiciones inusuales o excepcionales en el daemon de infraestructura de clave pública (pkid) de Juniper Networks Junos OS permite que un atacante en red no autenticado provoque una denegación de servicio (DoS). El pkid es responsable de la verificación del certificado. • https://supportportal.juniper.net/JSA79179 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVE-2024-30386 – Junos OS and Junos OS Evolved: In a EVPN-VXLAN scenario state changes on adjacent systems can cause an l2ald process crash
https://notcve.org/view.php?id=CVE-2024-30386
A Use-After-Free vulnerability in the Layer 2 Address Learning Daemon (l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS). In an EVPN-VXLAN scenario, when state updates are received and processed by the affected system, the correct order of some processing steps is not ensured, which can lead to an l2ald crash and restart. Whether the crash occurs depends on system internal timing which is outside the attackers control. This issue affects: Junos OS: * All versions before 20.4R3-S8, * 21.2 versions before 21.2R3-S6, * 21.3 versions before 21.3R3-S5, * 21.4 versions before 21.4R3-S4, * 22.1 versions before 22.1R3-S3, * 22.2 versions before 22.2R3-S1, * 22.3 versions before 22.3R3,, * 22.4 versions before 22.4R2; Junos OS Evolved: * All versions before 20.4R3-S8-EVO, * 21.2-EVO versions before 21.2R3-S6-EVO, * 21.3-EVO versions before 21.3R3-S5-EVO, * 21.4-EVO versions before 21.4R3-S4-EVO, * 22.1-EVO versions before 22.1R3-S3-EVO, * 22.2-EVO versions before 22.2R3-S1-EVO, * 22.3-EVO versions before 22.3R3-EVO, * 22.4-EVO versions before 22.4R2-EVO. Una vulnerabilidad de Use-After-Free en el daemon de aprendizaje de direcciones de capa 2 (l2ald) de Juniper Networks Junos OS y Junos OS Evolved permite que un atacante adyacente no autenticado provoque que l2ald falle, lo que provoca una denegación de servicio (DoS). En un escenario EVPN-VXLAN, cuando el sistema afectado recibe y procesa actualizaciones de estado, no se garantiza el orden correcto de algunos pasos de procesamiento, lo que puede provocar un bloqueo y reinicio de l2ald. Que se produzca el fallo depende de la sincronización interna del sistema, que está fuera del control de los atacantes. • http://supportportal.juniper.net/JSA79184 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-416: Use After Free •
CVE-2024-30387 – Junos OS: ACX5448 & ACX710: Due to interface flaps the PFE process can crash
https://notcve.org/view.php?id=CVE-2024-30387
A Missing Synchronization vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on ACX5448 and ACX710 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). If an interface flaps while the system gathers statistics on that interface, two processes simultaneously access a shared resource which leads to a PFE crash and restart. This issue affects Junos OS: * All versions before 20.4R3-S9, * 21.2 versions before 21.2R3-S5, * 21.3 versions before 21.3R3-S5, * 21.4 versions before 21.4R3-S4, * 22.1 versions before 22.1R3-S2, * 22.2 versions before 22.2R3-S2, * 22.3 versions before 22.3R2-S2, 22.3R3, * 22.4 versions before 22.4R2. Una vulnerabilidad de falta de sincronización en el motor de reenvío de paquetes (PFE) de Juniper Networks Junos OS en ACX5448 y ACX710 permite que un atacante adyacente no autenticado provoque una denegación de servicio (DoS). Si una interfaz parpadea mientras el sistema recopila estadísticas sobre esa interfaz, dos procesos acceden simultáneamente a un recurso compartido, lo que provoca un bloqueo y reinicio del PFE. Este problema afecta a Junos OS: todas las versiones anteriores a 20.4R3-S9, versiones 21.2 anteriores a 21.2R3-S5, versiones 21.3 anteriores a 21.3R3-S5, versiones 21.4 anteriores a 21.4R3-S4, versiones 22.1 anteriores a 22.1R3-S2, versiones 22.2 anteriores a 22.2 R3-S2, versiones 22.3 anteriores a 22.3R2-S2, 22.3R3, versiones 22.4 anteriores a 22.4R2. • http://supportportal.juniper.net/JSA79187 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-820: Missing Synchronization •
CVE-2024-30388 – Junos OS: QFX5000 Series and EX Series: Specific malformed LACP packets will cause flaps
https://notcve.org/view.php?id=CVE-2024-30388
An Improper Isolation or Compartmentalization vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series and EX Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). If a specific malformed LACP packet is received by a QFX5000 Series, or an EX4400, EX4100 or EX4650 Series device, an LACP flap will occur resulting in traffic loss. This issue affects Junos OS on QFX5000 Series, and on EX4400, EX4100 or EX4650 Series: * 20.4 versions from 20.4R3-S4 before 20.4R3-S8, * 21.2 versions from 21.2R3-S2 before 21.2R3-S6, * 21.4 versions from 21.4R2 before 21.4R3-S4, * 22.1 versions from 22.1R2 before 22.1R3-S3, * 22.2 versions before 22.2R3-S1, * 22.3 versions before 22.3R2-S2, 22.3R3, * 22.4 versions before 22.4R2-S1, 22.4R3. Una vulnerabilidad de aislamiento o compartimentación incorrecta en el motor de reenvío de paquetes (pfe) de Juniper Networks Junos OS en las series QFX5000 y EX permite que un atacante adyacente no autenticado provoque una denegación de servicio (DoS). Si un paquete LACP específico con formato incorrecto es recibido por un dispositivo de la serie QFX5000 o un dispositivo de la serie EX4400, EX4100 o EX4650, se producirá una falla de LACP que provocará una pérdida de tráfico. Este problema afecta a Junos OS en la serie QFX5000 y en las series EX4400, EX4100 o EX4650: * versiones 20.4 desde 20.4R3-S4 antes de 20.4R3-S8, * versiones 21.2 desde 21.2R3-S2 antes de 21.2R3-S6, * versiones 21.4 de 21.4R2 anterior a 21.4R3-S4, * 22.1 versiones anteriores a 22.1R2 anterior a 22.1R3-S3, * 22.2 versiones anteriores a 22.2R3-S1, * 22.3 versiones anteriores a 22.3R2-S2, 22.3R3, * 22.4 versiones anteriores a 22.4R2-S1, 22.4R3. • http://supportportal.juniper.net/JSA79089 https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L • CWE-653: Improper Isolation or Compartmentalization •