CVE-2024-39530
Junos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a
Denial-of-Service (DoS).
If an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage.
This issue affects Junos OS:
* 21.4 versions from 21.4R3 before 21.4R3-S5,
* 22.1 versions from 22.1R3 before 22.1R3-S4,
* 22.2 versions from 22.2R2 before 22.2R3,
* 22.3 versions from 22.3R1 before 22.3R2-S2, 22.3R3,
* 22.4 versions from 22.4R1 before 22.4R2.
This issue does not affect Junos OS versions earlier than 21.4.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-06-25 CVE Reserved
- 2024-07-11 CVE Published
- 2024-08-02 CVE Updated
- 2024-09-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-754: Improper Check for Unusual or Exceptional Conditions
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://supportportal.juniper.net/JSA82989 | 2024-07-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 21.4R3 < 21.4R3-S5 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 21.4R3 < 21.4R3-S5" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.1R3 < 22.1R3-S4 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.1R3 < 22.1R3-S4" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.2R2 < 22.2R3 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.2R2 < 22.2R3" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.3R1 < 22.3R2-S2 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3R1 < 22.3R2-S2" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.3R1 < 22.3R3 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.3R1 < 22.3R3" | en |
Affected
| ||||||
Juniper Networks Search vendor "Juniper Networks" | Junos OS Search vendor "Juniper Networks" for product "Junos OS" | >= 22.4R1 < 22.4R2 Search vendor "Juniper Networks" for product "Junos OS" and version " >= 22.4R1 < 22.4R2" | en |
Affected
|