CVE-2024-39538

Severity CVSS v4.0:
HIGH
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
11/07/2024
Last modified:
22/01/2026

Description

A Buffer Copy without Checking Size of Input vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause a <br /> <br /> Denial-of-Service (DoS).When multicast traffic with a specific, valid (S,G) is received, evo-pfemand crashes which leads to an outage of the affected FPC until it is manually recovered.<br /> <br /> <br /> This issue affects Junos OS Evolved on ACX7000 Series:<br /> <br /> <br /> * All versions before 21.2R3-S8-EVO,<br /> * 21.4-EVO versions before 21.4R3-S7-EVO,<br /> * 22.2-EVO versions before 22.2R3-S4-EVO,<br /> * 22.3-EVO versions before 22.3R3-S3-EVO, <br /> * 22.4-EVO versions before 22.4R3-S2-EVO, <br /> * 23.2-EVO versions before 23.2R2-EVO, <br /> * 23.4-EVO versions before 23.4R1-S2-EVO, 23.4R2-EVO.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* 21.2 (excluding)
cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*