CVE-2024-39511

Severity CVSS v4.0:
MEDIUM
Type:
CWE-20 Input Validation
Publication date:
10/07/2024
Last modified:
07/02/2025

Description

An Improper Input Validation vulnerability in the 802.1X Authentication (dot1x) Daemon of Juniper Networks Junos OS allows a local, low-privileged attacker with access to the CLI to cause a Denial of Service (DoS).<br /> <br /> On running a specific operational dot1x command, the dot1x daemon crashes. An attacker can cause a sustained DoS condition by running this command repeatedly.<br /> <br /> When the crash occurs, the authentication status of any 802.1x clients is cleared, and any authorized dot1x port becomes unauthorized. The client cannot re-authenticate until the dot1x daemon restarts.<br /> <br /> This issue affects Junos OS:<br /> * All versions before 20.4R3-S10;<br /> * 21.2 versions before 21.2R3-S7;<br /> * 21.4 versions before 21.4R3-S6;<br /> * 22.1 versions before 22.1R3-S5;<br /> * 22.2 versions before 22.2R3-S3;<br /> * 22.3 versions before 22.3R3-S2;<br /> * 22.4 versions before 22.4R3-S1;<br /> * 23.2 versions before 23.2R2.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* 20.4 (excluding)
cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*