CVE-2024-39526Improper Handling of Exceptional Conditions in Networks Junos OS

Severity
7.1HIGHNVD
EPSS
0.1%
top 76.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11

Description

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 line cards, EX9200 with EX9200-15C lines cards, MX304 devices, and Juniper Networks Junos OS Evolved on PTX Series, allows an attacker sending malformed DHCP packets to cause ingress packet processing to stop, leading to a Denial of Service (DoS). Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condit

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved19.3R1-EVO21.2R3-S8-EVO+7
NVDjuniper/junos_os_evolved19.421.2+9
CVEListV5juniper_networks/junos_os21.421.4R3-S6+5
NVDjuniper/junos< 21.2+6

🔴Vulnerability Details

2
GHSA
GHSA-qxf5-vpwf-vj9q: An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 li2024-10-11
CVEList
Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11/LC9600, MX304, EX9200, PTX Series: Receipt of malformed DHCP packets causes interfaces to stop processing packets2024-10-11

📋Vendor Advisories

1
Juniper
CVE-2024-39526: An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS on MX Series with MPC10/MPC11/LC9600 li2024-10-11