CVE-2024-39542Improper Validation of Syntactic Correctness of Input in Networks Junos OS

Severity
8.7HIGHNVD
EPSS
0.3%
top 44.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11

Description

An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthenticated, network based attacker to cause a Denial-of-Service (DoS). This issue can occur in two scenarios: 1. If a device, which is configured with SFLOW and ECMP, receives specific valid transit traffic, which is subject to sampling, the packetio

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages4 packages

CVEListV5juniper_networks/junos_os_evolved21.421.4R2-EVO+1
CVEListV5juniper_networks/junos_os21.421.4R2+2
NVDjuniper/junos_os_evolved21.2, 21.4+1
NVDjuniper/junos21.4, 22.2+1

🔴Vulnerability Details

2
GHSA
GHSA-34f4-m9rh-9x9j: An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series2024-07-11
CVEList
Junos OS and Junos OS Evolved: A malformed CFM packet or specific transit traffic leads to FPC crash2024-07-11

📋Vendor Advisories

1
Juniper
CVE-2024-39542: An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series2024-07-11
CVE-2024-39542 — Networks Junos OS vulnerability | cvebase