CVE-2024-39559Improper Check for Unusual or Exceptional Conditions in Networks Junos OS Evolved

Severity
8.2HIGHNVD
EPSS
0.4%
top 38.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 10
Latest updateJul 11

Description

An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-based unauthenticated attacker to crash the device (vmcore) by sending a specific TCP packet over an established TCP session with MD5 authentication enabled, destined to an accessible port on the device, resulting in a Denial of Service (DoS). The receipt of this packet must occur within a specific timing window outside the attacker's control (i.e.,

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved21.4-EVO21.4R3-S6-EVO+5

🔴Vulnerability Details

2
GHSA
GHSA-473h-3vgg-7379: An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-ba2024-07-11
CVEList
Junos OS Evolved: Receipt of a specific TCP packet may result in a system crash (vmcore) on dual RE systems with NSR enabled2024-07-10

📋Vendor Advisories

1
Juniper
CVE-2024-39559: An Improper Check for Unusual or Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS Evolved may allow a network-ba2024-07-10
CVE-2024-39559 — HIGH severity | cvebase