CVE-2024-47498Networks Junos OS Evolved vulnerability

4 documents4 sources
Severity
7.1HIGHNVD
EPSS
0.1%
top 64.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11

Description

An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to enforce limits on MAC learning and moves can be configured but do not take effect. This can lead to control plane overload situations which will severely impact the ability of the device to processes legitimate traffic. This issue affects Junos OS

CVSS vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved22.2-EVO22.2R3-S5-EVO+3

🔴Vulnerability Details

2
GHSA
GHSA-43mx-p8wf-wh27: An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticate2024-10-11
CVEList
Junos OS Evolved: QFX5000 Series: Configured MAC learning and move limits are not in effect2024-10-11

📋Vendor Advisories

1
Juniper
CVE-2024-47498: An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticate2024-10-11
CVE-2024-47498 — HIGH severity | cvebase