CVE-2024-30390
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
12/04/2024
Last modified:
06/02/2025
Description
An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane.<br />
<br />
When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn&#39;t consider existing connections anymore for subsequent connection attempts so that the connection limit can be exceeded.<br />
This issue affects Junos OS Evolved:<br />
<br />
<br />
<br />
* All versions before 21.4R3-S4-EVO,<br />
* 22.1-EVO versions before 22.1R3-S3-EVO,<br />
* 22.2-EVO versions before 22.2R3-S2-EVO, <br />
* 22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO.
Impact
Base Score 4.0
6.90
Severity 4.0
MEDIUM
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* | 21.4 (excluding) | |
| cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



