CVE-2024-39542 — Improper Validation of Syntactic Correctness of Input in Networks Junos OS
Severity
8.7HIGHNVD
EPSS
0.3%
top 44.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Description
An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthenticated, network based attacker to cause a Denial-of-Service (DoS).
This issue can occur in two scenarios:
1. If a device, which is configured with SFLOW and ECMP, receives specific valid transit traffic, which is subject to sampling, the packetio…
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
Affected Packages4 packages
🔴Vulnerability Details
2GHSA▶
GHSA-34f4-m9rh-9x9j: An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series↗2024-07-11
CVEList▶
Junos OS and Junos OS Evolved: A malformed CFM packet or specific transit traffic leads to FPC crash↗2024-07-11
📋Vendor Advisories
1Juniper▶
CVE-2024-39542: An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series↗2024-07-11