CVE-2024-21595
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/01/2024
Last modified:
18/01/2024
Description
<br />
An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).<br />
<br />
If an attacker sends high rate of specific ICMP traffic to a device with VXLAN configured, this causes a deadlock of the PFE and results in the device becoming unresponsive. A manual restart will be required to recover the device.<br />
<br />
This issue only affects EX4100, EX4400, EX4600, QFX5000 Series devices.<br />
<br />
This issue affects:<br />
<br />
Juniper Networks Junos OS<br />
<br />
<br />
<br />
* 21.4R3 versions earlier than 21.4R3-S4;<br />
* 22.1R3 versions earlier than 22.1R3-S3;<br />
* 22.2R2 versions earlier than 22.2R3-S1;<br />
* 22.3 versions earlier than 22.3R2-S2, 22.3R3;<br />
* 22.4 versions earlier than 22.4R2;<br />
* 23.1 versions earlier than 23.1R2.<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



