CVE-2024-39542
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
11/07/2024
Last modified:
08/08/2025
Description
An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MPC10/11 or LC9600, MX304, and Junos OS Evolved on ACX Series and PTX Series allows an unauthenticated, network based attacker to cause a Denial-of-Service (DoS).<br />
<br />
This issue can occur in two scenarios:<br />
<br />
1. If a device, which is configured with SFLOW and ECMP, receives specific valid transit traffic, which is subject to sampling, the packetio process crashes, which in turn leads to an evo-aftman crash and causes the FPC to stop working until it is restarted. (This scenario is only applicable to PTX but not to ACX or MX.)<br />
<br />
2. If a device receives a malformed CFM packet on an interface configured with CFM, the packetio process crashes, which in turn leads to an evo-aftman crash and causes the FPC to stop working until it is restarted. Please note that the CVSS score is for the formally more severe issue 1.<br />
<br />
The CVSS score for scenario 2. is: 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)<br />
<br />
<br />
<br />
<br />
This issue affects Junos OS:<br />
<br />
<br />
<br />
* All versions before 21.2R3-S4,<br />
* 21.4 versions before 21.4R2,<br />
* 22.2 versions before 22.2R3-S2; <br />
<br />
<br />
<br />
<br />
Junos OS Evolved:<br />
<br />
<br />
<br />
<br />
* All versions before 21.2R3-S8-EVO,<br />
* 21.4 versions before 21.4R2-EVO.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:* | ||
| cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



