CVE-2024-21586

EUVD-2024-19234
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).

If an affected device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart.  Continued receipt and processing of this traffic will create a sustained DoS condition.

This issue affects Junos OS on SRX Series:

  *  21.4 versions before 21.4R3-S7.9,
  *  22.1 versions before 22.1R3-S5.3,
  *  22.2 versions before 22.2R3-S4.11,
  *  22.3 versions before 22.3R3,
  *  22.4 versions before 22.4R3.






This issue affects Junos OS on NFX Series:

  *  21.4 versions before 21.4R3-S8,
  *  22.1 versions after 22.1R1,
  *  22.2 versions before 22.2R3-S5,
  *  22.3 versions before 22.3R3,
  *  22.4 versions before 22.4R3.






Junos OS versions prior to 21.4R1 are not affected by this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
Affected Products (NVD)
VendorProductVersion
juniperjunos
𝑥
< 21.4r1
juniperjunos
21.4
juniperjunos
21.4:r1
juniperjunos
21.4:r1-s1
juniperjunos
21.4:r1-s2
juniperjunos
21.4:r2
juniperjunos
21.4:r2-s1
juniperjunos
21.4:r2-s2
juniperjunos
21.4:r3
juniperjunos
21.4:r3-s1
juniperjunos
21.4:r3-s2
juniperjunos
21.4:r3-s3
juniperjunos
21.4:r3-s4
juniperjunos
21.4:r3-s5
juniperjunos
21.4:r3-s6
juniperjunos
21.4:r3-s7
juniperjunos
22.1
juniperjunos
22.1:r1
juniperjunos
22.1:r1-s1
juniperjunos
22.1:r1-s2
juniperjunos
22.1:r2
juniperjunos
22.1:r2-s1
juniperjunos
22.1:r2-s2
juniperjunos
22.1:r3
juniperjunos
22.1:r3-s1
juniperjunos
22.1:r3-s2
juniperjunos
22.1:r3-s3
juniperjunos
22.1:r3-s4
juniperjunos
22.1:r3-s5
juniperjunos
22.2
juniperjunos
22.2:r1
juniperjunos
22.2:r1-s1
juniperjunos
22.2:r1-s2
juniperjunos
22.2:r2
juniperjunos
22.2:r2-s1
juniperjunos
22.2:r2-s2
juniperjunos
22.2:r3
juniperjunos
22.2:r3-s1
juniperjunos
22.2:r3-s2
juniperjunos
22.2:r3-s3
juniperjunos
22.2:r3-s4
juniperjunos
22.3
juniperjunos
22.3:r1
juniperjunos
22.3:r1-s1
juniperjunos
22.3:r1-s2
juniperjunos
22.3:r2
juniperjunos
22.3:r2-s1
juniperjunos
22.3:r2-s2
juniperjunos
22.4
juniperjunos
22.4:r1
juniperjunos
22.4:r1-s1
juniperjunos
22.4:r1-s2
juniperjunos
22.4:r2
juniperjunos
22.4:r2-s1
juniperjunos
22.4:r2-s2
juniperjunos
21.4
juniperjunos
21.4:r1
juniperjunos
21.4:r1-s1
juniperjunos
21.4:r1-s2
juniperjunos
21.4:r2
juniperjunos
21.4:r2-s1
juniperjunos
21.4:r2-s2
juniperjunos
21.4:r3
juniperjunos
21.4:r3-s1
juniperjunos
21.4:r3-s2
juniperjunos
21.4:r3-s3
juniperjunos
21.4:r3-s4
juniperjunos
21.4:r3-s5
juniperjunos
21.4:r3-s6
juniperjunos
21.4:r3-s7
juniperjunos
22.1:r1-s1
juniperjunos
22.1:r1-s2
juniperjunos
22.1:r2
juniperjunos
22.1:r2-s1
juniperjunos
22.1:r2-s2
juniperjunos
22.1:r3
juniperjunos
22.1:r3-s1
juniperjunos
22.1:r3-s2
juniperjunos
22.1:r3-s3
juniperjunos
22.1:r3-s4
juniperjunos
22.1:r3-s5
juniperjunos
22.2
juniperjunos
22.2:r1
juniperjunos
22.2:r1-s1
juniperjunos
22.2:r1-s2
juniperjunos
22.2:r2
juniperjunos
22.2:r2-s1
juniperjunos
22.2:r2-s2
juniperjunos
22.2:r3
juniperjunos
22.2:r3-s1
juniperjunos
22.2:r3-s2
juniperjunos
22.2:r3-s3
juniperjunos
22.2:r3-s4
juniperjunos
22.3
juniperjunos
22.3:r1
juniperjunos
22.3:r1-s1
juniperjunos
22.3:r1-s2
juniperjunos
22.3:r2
juniperjunos
22.3:r2-s1
juniperjunos
22.3:r2-s2
juniperjunos
22.4
juniperjunos
22.4:r1
juniperjunos
22.4:r1-s1
juniperjunos
22.4:r1-s2
juniperjunos
22.4:r2
juniperjunos
22.4:r2-s1
juniperjunos
22.4:r2-s2
𝑥
= Vulnerable software versions