CVE-2024-39537Improper Restriction of Communication Channel to Intended Endpoints in Networks Junos OS Evolved

Severity
6.9MEDIUMNVD
EPSS
0.3%
top 50.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network-based attacker to cause a limited information disclosure and availability impact to the device. Due to a wrong initialization, specific processes which should only be able to communicate internally within the device can be reached over the network via open ports. This issue affects Junos OS Evolved on ACX 7000 Series:

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved22.2-EVO22.2R3-S4-EVO+5

🔴Vulnerability Details

2
CVEList
Junos OS Evolved: ACX7000 Series: Ports which have been inadvertently exposed can be reached over the network2024-07-11
GHSA
GHSA-8r2p-hq88-fpcf: An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Networks Junos OS Evolved on ACX 7000 Series allows an2024-07-11

📋Vendor Advisories

1
Juniper
CVE-2024-39537: An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Juniper Networks Junos OS Evolved on ACX 7000 Series allows an2024-07-11
CVE-2024-39537 — MEDIUM severity | cvebase