CVE-2024-47502Allocation of Resources Without Limits or Throttling in Networks Junos OS Evolved

Severity
8.7HIGHNVD
EPSS
0.4%
top 37.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 11

Description

An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In specific cases the state of TCP sessions that are terminated is not cleared, which over time leads to an exhaustion of resources, preventing new connections to the control plane from being established. A continuously increasing number of connections shown by: user@host > show system co

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Affected Packages2 packages

CVEListV5juniper_networks/junos_os_evolved22.222.2R3-S4-EVO+4

🔴Vulnerability Details

2
GHSA
GHSA-8pm6-575p-r3mv: An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, ne2024-10-11
CVEList
Junos OS Evolved: TCP session state is not always cleared on the Routing Engine leading to DoS2024-10-11

📋Vendor Advisories

1
Juniper
CVE-2024-47502: An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, ne2024-10-11
CVE-2024-47502 — HIGH severity | cvebase