CVE-2024-30409Improper Check for Unusual or Exceptional Conditions in Networks Junos OS

Severity
6.9MEDIUMNVD
EPSS
0.1%
top 74.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 12

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated attacker to cause the forwarding information base telemetry daemon (fibtd) to crash, leading to a limited Denial of Service. This issue affects Juniper Networks Junos OS: * from 22.1 before 22.1R1-S2, 22.1R2. Junos OS Evolved: * from 22.1 before 22.1R1-S2-EVO, 22.1R2-EVO.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved22.1-EVO22.1R1-S2-EVO, 22.1R2-EVO
CVEListV5juniper_networks/junos_os22.122.1R1-S2, 22.1R2
NVDjuniper/junos22.1

🔴Vulnerability Details

2
CVEList
Junos OS and Junos OS Evolved: Higher CPU consumption on routing engine leads to Denial of Service (DoS).2024-04-12
GHSA
GHSA-474g-v543-635g: An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows2024-04-12

📋Vendor Advisories

1
Juniper
CVE-2024-30409: An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows2024-04-12
CVE-2024-30409 — Networks Junos OS vulnerability | cvebase