CVE-2024-39511
Severity CVSS v4.0:
MEDIUM
Type:
CWE-20
Input Validation
Publication date:
10/07/2024
Last modified:
07/02/2025
Description
An Improper Input Validation vulnerability in the 802.1X Authentication (dot1x) Daemon of Juniper Networks Junos OS allows a local, low-privileged attacker with access to the CLI to cause a Denial of Service (DoS).<br />
<br />
On running a specific operational dot1x command, the dot1x daemon crashes. An attacker can cause a sustained DoS condition by running this command repeatedly.<br />
<br />
When the crash occurs, the authentication status of any 802.1x clients is cleared, and any authorized dot1x port becomes unauthorized. The client cannot re-authenticate until the dot1x daemon restarts.<br />
<br />
This issue affects Junos OS:<br />
* All versions before 20.4R3-S10;<br />
* 21.2 versions before 21.2R3-S7;<br />
* 21.4 versions before 21.4R3-S6;<br />
* 22.1 versions before 22.1R3-S5;<br />
* 22.2 versions before 22.2R3-S3;<br />
* 22.3 versions before 22.3R3-S2;<br />
* 22.4 versions before 22.4R3-S1;<br />
* 23.2 versions before 23.2R2.
Impact
Base Score 4.0
6.80
Severity 4.0
MEDIUM
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* | 20.4 (excluding) | |
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:* | ||
cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page