CVE-2024-21600
12.01.2024, 01:15
An Improper Neutralization of Equivalent Special Elements vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on PTX Series allows a unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When MPLS packets are meant to be sent to a flexible tunnel interface (FTI) and if the FTI tunnel is down, these will hit the reject NH, due to which the packets get sent to the CPU and cause a host path wedge condition. This will cause the FPC to hang and requires a manual restart to recover. Please note that this issue specifically affects PTX1000, PTX3000, PTX5000 with FPC3, PTX10002-60C, and PTX10008/16 with LC110x. Other PTX Series devices and Line Cards (LC) are not affected. The following log message can be seen when the issue occurs: Cmerror Op Set: Host Loopback: HOST LOOPBACK WEDGE DETECTED IN PATH ID <id> (URI: /fpc/<fpc>/pfe/<pfe>/cm/<cm>/Host_Loopback/<cm>/HOST_LOOPBACK_MAKE_CMERROR_ID[<id>]) This issue affects Juniper Networks Junos OS: * All versions earlier than 20.4R3-S8; * 21.1 versions earlier than 21.1R3-S4; * 21.2 versions earlier than 21.2R3-S6; * 21.3 versions earlier than 21.3R3-S3; * 21.4 versions earlier than 21.4R3-S5; * 22.1 versions earlier than 22.1R2-S2, 22.1R3; * 22.2 versions earlier than 22.2R2-S1, 22.2R3.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 20.4 |
juniper | junos | 20.4:r1 |
juniper | junos | 20.4:r1-s1 |
juniper | junos | 20.4:r2 |
juniper | junos | 20.4:r2-s1 |
juniper | junos | 20.4:r2-s2 |
juniper | junos | 20.4:r3 |
juniper | junos | 20.4:r3-s1 |
juniper | junos | 20.4:r3-s2 |
juniper | junos | 20.4:r3-s3 |
juniper | junos | 20.4:r3-s4 |
juniper | junos | 20.4:r3-s5 |
juniper | junos | 20.4:r3-s6 |
juniper | junos | 20.4:r3-s7 |
juniper | junos | 21.1 |
juniper | junos | 21.1:r1 |
juniper | junos | 21.1:r1-s1 |
juniper | junos | 21.1:r2 |
juniper | junos | 21.1:r2-s1 |
juniper | junos | 21.1:r2-s2 |
juniper | junos | 21.1:r3 |
juniper | junos | 21.1:r3-s1 |
juniper | junos | 21.1:r3-s2 |
juniper | junos | 21.1:r3-s3 |
juniper | junos | 21.2 |
juniper | junos | 21.2:r1 |
juniper | junos | 21.2:r1-s1 |
juniper | junos | 21.2:r1-s2 |
juniper | junos | 21.2:r2 |
juniper | junos | 21.2:r2-s1 |
juniper | junos | 21.2:r2-s2 |
juniper | junos | 21.2:r3 |
juniper | junos | 21.2:r3-s1 |
juniper | junos | 21.2:r3-s2 |
juniper | junos | 21.2:r3-s3 |
juniper | junos | 21.2:r3-s4 |
juniper | junos | 21.2:r3-s5 |
juniper | junos | 21.3 |
juniper | junos | 21.3:r1 |
juniper | junos | 21.3:r1-s1 |
juniper | junos | 21.3:r1-s2 |
juniper | junos | 21.3:r2 |
juniper | junos | 21.3:r2-s1 |
juniper | junos | 21.3:r2-s2 |
juniper | junos | 21.3:r3 |
juniper | junos | 21.3:r3-s1 |
juniper | junos | 21.3:r3-s2 |
juniper | junos | 21.4 |
juniper | junos | 21.4:r1 |
juniper | junos | 21.4:r1-s1 |
juniper | junos | 21.4:r1-s2 |
juniper | junos | 21.4:r2 |
juniper | junos | 21.4:r2-s1 |
juniper | junos | 21.4:r2-s2 |
juniper | junos | 21.4:r3 |
juniper | junos | 21.4:r3-s1 |
juniper | junos | 21.4:r3-s2 |
juniper | junos | 21.4:r3-s3 |
juniper | junos | 21.4:r3-s4 |
juniper | junos | 22.1 |
juniper | junos | 22.1:r1 |
juniper | junos | 22.1:r1-s1 |
juniper | junos | 22.1:r1-s2 |
juniper | junos | 22.1:r2 |
juniper | junos | 22.1:r2-s1 |
juniper | junos | 22.2 |
juniper | junos | 22.2:r1 |
juniper | junos | 22.2:r1-s1 |
juniper | junos | 22.2:r1-s2 |
juniper | junos | 22.2:r2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References