CVE-2024-39531
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
11/07/2024
Last modified:
22/01/2026
Description
An Improper Handling of Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows a network-based, unauthenticated attacker to cause a Denial-of-Service (DoS).<br />
<br />
If a value is configured for DDoS bandwidth or burst parameters for any protocol in<br />
a queue, all protocols which share the same queue will have<br />
their bandwidth or burst value changed to the new value. If, for example, OSPF was configured with a certain bandwidth value, ISIS would also be limited to this value. So inadvertently either the control plane is open for a high level of specific traffic which was supposed to be limited to a lower value, or the limit for a certain protocol is so low that chances to succeed with a volumetric DoS attack are significantly increased. <br />
<br />
<br />
<br />
<br />
This issue affects Junos OS Evolved on ACX 7000 Series:<br />
<br />
<br />
<br />
* All versions before 21.4R3-S7-EVO,<br />
* 22.1 versions before 22.1R3-S6-EVO, <br />
* 22.2 versions before 22.2R3-S3-EVO,<br />
* 22.3 versions before 22.3R3-S3-EVO, <br />
* 22.4 versions before 22.4R3-S2-EVO,<br />
* 23.2 versions before 23.2R2-EVO,<br />
* 23.4 <br />
<br />
versions <br />
<br />
before 23.4R1-S1-EVO, 23.4R2-EVO.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* | 21.4 (excluding) | |
| cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s5:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



