CVE-2024-30380Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 72.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16

Description

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP, ERP, and LLDP. The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP, leading to a Denial of S

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.321.3R3-S5-EVO+7
CVEListV5juniper_networks/junos_os21.221.2R3-S7+8
NVDjuniper/junos< 20.4+9

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV2024-04-16
GHSA
GHSA-x7p5-c683-6jrp: An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated atta2024-04-16

📋Vendor Advisories

1
Juniper
CVE-2024-30380: An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated atta2024-04-16
CVE-2024-30380 — Networks Junos OS vulnerability | cvebase