CVE-2024-21586
Junos OS: SRX Series and NFX Series: Specific valid traffic leads to a PFE crash
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
If an affected device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition.
This issue affects Junos OS on SRX Series:
* 21.4 versions before 21.4R3-S7.9,
* 22.1 versions before 22.1R3-S5.3,
* 22.2 versions before 22.2R3-S4.11,
* 22.3 versions before 22.3R3,
* 22.4 versions before 22.4R3.
This issue affects Junos OS on NFX Series:
* 21.4 versions before 21.4R3-S8,
* 22.1 versions after 22.1R1,
* 22.2 versions before 22.2R3-S5,
* 22.3 versions before 22.3R3,
* 22.4 versions before 22.4R3.
Junos OS versions prior to 21.4R1 are not affected by this issue.
Una verificación inadecuada de la vulnerabilidad de condiciones inusuales o excepcionales en el motor de reenvío de paquetes (PFE) de Juniper Networks Junos OS en la serie SRX permite que un atacante basado en red no autenticado provoque una denegación de servicio (DoS). Si un dispositivo de la serie SRX recibe tráfico válido específico destinado al dispositivo, provocará que el PFE falle y se reinicie. La recepción y procesamiento continuo de este tráfico creará una condición DoS sostenida. Este problema afecta a Junos OS en la serie SRX: * versiones 21.4 anteriores a 21.4R3-S7.9, * versiones 22.1 anteriores a 22.1R3-S5.3, * versiones 22.2 anteriores a 22.2R3-S4.11, * versiones 22.3 anteriores a 22.3R3, * Versiones 22.4 anteriores a 22.4R3. Las versiones de Junos OS anteriores a la 21.4R1 no se ven afectadas por este problema.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-12-27 CVE Reserved
- 2024-07-01 CVE Published
- 2024-07-02 EPSS Updated
- 2024-08-01 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://supportportal.juniper.net/JSA83195 | 2024-07-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 21.4.0 < 21.4R3-S7.9 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.4.0 < 21.4R3-S7.9" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.1.0 < 22.1R3-S5.3 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.1.0 < 22.1R3-S5.3" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.2.0 < 22.2R3-S4.11 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.2.0 < 22.2R3-S4.11" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.3 < 22.3R3 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3 < 22.3R3" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.4 < 22.4R3 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4 < 22.4R3" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 21.4 < 21.4R3-S8 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.4 < 21.4R3-S8" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | 22.1 Search vendor "Juniper Networks" for product "Junos OS" and version "22.1" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.2 < 22.2R3-S5 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.2 < 22.2R3-S5" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.3 < 22.3R3 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3 < 22.3R3" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.4 < 22.4R3 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4 < 22.4R3" | en |
Affected
|