CVE-2024-21604
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/01/2024
Last modified:
19/01/2024
Description
<br />
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).<br />
<br />
If a high rate of specific valid packets are processed by the routing engine (RE) this will lead to a loss of connectivity of the RE with other components of the chassis and thereby a complete and persistent system outage. Please note that a carefully designed lo0 firewall filter will block or limit these packets which should prevent this issue from occurring.<br />
<br />
The following log messages can be seen when this issue occurs:<br />
<br />
kernel: nf_conntrack: nf_conntrack: table full, dropping packet<br />
This issue affects Juniper Networks Junos OS Evolved:<br />
<br />
<br />
<br />
* All versions earlier than 20.4R3-S7-EVO;<br />
* 21.2R1-EVO and later versions;<br />
* 21.4-EVO versions earlier than 21.4R3-S5-EVO;<br />
* 22.1-EVO versions earlier than 22.1R3-S2-EVO;<br />
* 22.2-EVO versions earlier than 22.2R3-EVO;<br />
* 22.3-EVO versions earlier than 22.3R2-EVO;<br />
* 22.4-EVO versions earlier than 22.4R2-EVO.<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



