// For flags

CVE-2024-30388

Junos OS: QFX5000 Series and EX Series: Specific malformed LACP packets will cause flaps

Severity Score

7.1
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

An Improper Isolation or Compartmentalization vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series and EX Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).

If a specific malformed LACP packet is received by a QFX5000 Series, or an EX4400, EX4100 or EX4650 Series device, an LACP flap will occur resulting in traffic loss.
This issue affects Junos OS on QFX5000 Series, and on EX4400, EX4100 or EX4650 Series:



* 20.4 versions from

20.4R3-S4

before 20.4R3-S8,
* 21.2 versions from

21.2R3-S2

before 21.2R3-S6,
* 21.4 versions from

21.4R2

before 21.4R3-S4,

* 22.1 versions from

22.1R2

before 22.1R3-S3,
* 22.2 versions before 22.2R3-S1,
* 22.3 versions before 22.3R2-S2, 22.3R3,
* 22.4 versions before 22.4R2-S1, 22.4R3.

Una vulnerabilidad de aislamiento o compartimentación incorrecta en el motor de reenvío de paquetes (pfe) de Juniper Networks Junos OS en las series QFX5000 y EX permite que un atacante adyacente no autenticado provoque una denegación de servicio (DoS). Si un paquete LACP específico con formato incorrecto es recibido por un dispositivo de la serie QFX5000 o un dispositivo de la serie EX4400, EX4100 o EX4650, se producirá una falla de LACP que provocará una pérdida de tráfico. Este problema afecta a Junos OS en la serie QFX5000 y en las series EX4400, EX4100 o EX4650: * versiones 20.4 desde 20.4R3-S4 antes de 20.4R3-S8, * versiones 21.2 desde 21.2R3-S2 antes de 21.2R3-S6, * versiones 21.4 de 21.4R2 anterior a 21.4R3-S4, * 22.1 versiones anteriores a 22.1R2 anterior a 22.1R3-S3, * 22.2 versiones anteriores a 22.2R3-S1, * 22.3 versiones anteriores a 22.3R2-S2, 22.3R3, * 22.4 versiones anteriores a 22.4R2-S1, 22.4R3.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
Low
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-03-26 CVE Reserved
  • 2024-04-12 CVE Published
  • 2024-04-21 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-653: Improper Isolation or Compartmentalization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 20.4R3-S4 < 20.4R3-S8
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 20.4R3-S4 < 20.4R3-S8"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 21.2R3-S2 < 21.2R3-S6
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.2R3-S2 < 21.2R3-S6"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 21.4R2 < 21.4R3-S4
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.4R2 < 21.4R3-S4"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.1R2 < 22.1R3-S3
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.1R2 < 22.1R3-S3"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.2 < 22.2R3-S1
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.2 < 22.2R3-S1"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.3 < 22.3R2-S2
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3 < 22.3R2-S2"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.3 < 22.3R3
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3 < 22.3R3"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.4 < 22.4R2-S1
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4 < 22.4R2-S1"
en
Affected
Juniper Networks
Search vendor "Juniper Networks"
Junos OS
Search vendor "Juniper Networks" for product "Junos OS"
>= 22.4 < 22.4R3
Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4 < 22.4R3"
en
Affected