CVE-2024-39513

An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS).

When a specific "clear" command is run, theAdvanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) crashes and restarts.

The crashimpacts all traffic going through the FPCs, causing a DoS. Running the command repeatedly leads to a sustained DoS condition.
This issue affects Junos OS Evolved:



  *  All versions before 20.4R3-S9-EVO,
  *  from 21.2-EVO before 21.2R3-S7-EVO,
  *  from 21.3-EVO before 21.3R3-S5-EVO,
  *  from 21.4-EVO before 21.4R3-S6-EVO,
  *  from 22.1-EVO before 22.1R3-S4-EVO,
  *  from 22.2-EVO before 22.2R3-S3-EVO,
  *  from 22.3-EVO before 22.3R3-S3-EVO,
  *  from 22.4-EVO before 22.4R3-EVO,
  *  from 23.2-EVO before 23.2R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
juniperCNA
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 8%
VendorProductVersion
juniperjunos_os_evolved
𝑥
< 20.4
juniperjunos_os_evolved
20.4
juniperjunos_os_evolved
20.4:r1
juniperjunos_os_evolved
20.4:r1-s1
juniperjunos_os_evolved
20.4:r1-s2
juniperjunos_os_evolved
20.4:r2
juniperjunos_os_evolved
20.4:r2-s1
juniperjunos_os_evolved
20.4:r2-s2
juniperjunos_os_evolved
20.4:r2-s3
juniperjunos_os_evolved
20.4:r3
juniperjunos_os_evolved
20.4:r3-s1
juniperjunos_os_evolved
20.4:r3-s2
juniperjunos_os_evolved
20.4:r3-s3
juniperjunos_os_evolved
20.4:r3-s4
juniperjunos_os_evolved
20.4:r3-s5
juniperjunos_os_evolved
20.4:r3-s6
juniperjunos_os_evolved
20.4:r3-s7
juniperjunos_os_evolved
20.4:r3-s8
juniperjunos_os_evolved
21.2
juniperjunos_os_evolved
21.2:r1
juniperjunos_os_evolved
21.2:r1-s1
juniperjunos_os_evolved
21.2:r1-s2
juniperjunos_os_evolved
21.2:r2
juniperjunos_os_evolved
21.2:r2-s1
juniperjunos_os_evolved
21.2:r2-s2
juniperjunos_os_evolved
21.2:r3
juniperjunos_os_evolved
21.2:r3-s1
juniperjunos_os_evolved
21.2:r3-s2
juniperjunos_os_evolved
21.2:r3-s3
juniperjunos_os_evolved
21.2:r3-s4
juniperjunos_os_evolved
21.2:r3-s5
juniperjunos_os_evolved
21.2:r3-s6
juniperjunos_os_evolved
21.3
juniperjunos_os_evolved
21.3:r1
juniperjunos_os_evolved
21.3:r1-s1
juniperjunos_os_evolved
21.3:r2
juniperjunos_os_evolved
21.3:r2-s1
juniperjunos_os_evolved
21.3:r2-s2
juniperjunos_os_evolved
21.3:r3
juniperjunos_os_evolved
21.3:r3-s1
juniperjunos_os_evolved
21.3:r3-s2
juniperjunos_os_evolved
21.3:r3-s3
juniperjunos_os_evolved
21.3:r3-s4
juniperjunos_os_evolved
21.4
juniperjunos_os_evolved
21.4:r1
juniperjunos_os_evolved
21.4:r1-s1
juniperjunos_os_evolved
21.4:r1-s2
juniperjunos_os_evolved
21.4:r2
juniperjunos_os_evolved
21.4:r2-s1
juniperjunos_os_evolved
21.4:r2-s2
juniperjunos_os_evolved
21.4:r3
juniperjunos_os_evolved
21.4:r3-s1
juniperjunos_os_evolved
21.4:r3-s2
juniperjunos_os_evolved
21.4:r3-s3
juniperjunos_os_evolved
21.4:r3-s4
juniperjunos_os_evolved
21.4:r3-s5
juniperjunos_os_evolved
22.1
juniperjunos_os_evolved
22.1:r1
juniperjunos_os_evolved
22.1:r1-s1
juniperjunos_os_evolved
22.1:r1-s2
juniperjunos_os_evolved
22.1:r2
juniperjunos_os_evolved
22.1:r2-s1
juniperjunos_os_evolved
22.1:r3
juniperjunos_os_evolved
22.1:r3-s1
juniperjunos_os_evolved
22.1:r3-s2
juniperjunos_os_evolved
22.1:r3-s3
juniperjunos_os_evolved
22.2
juniperjunos_os_evolved
22.2:r1
juniperjunos_os_evolved
22.2:r1-s1
juniperjunos_os_evolved
22.2:r1-s2
juniperjunos_os_evolved
22.2:r2
juniperjunos_os_evolved
22.2:r2-s1
juniperjunos_os_evolved
22.2:r2-s2
juniperjunos_os_evolved
22.2:r3
juniperjunos_os_evolved
22.2:r3-s1
juniperjunos_os_evolved
22.2:r3-s2
juniperjunos_os_evolved
22.3
juniperjunos_os_evolved
22.3:r1
juniperjunos_os_evolved
22.3:r1-s1
juniperjunos_os_evolved
22.3:r1-s2
juniperjunos_os_evolved
22.3:r2
juniperjunos_os_evolved
22.3:r2-s1
juniperjunos_os_evolved
22.3:r2-s2
juniperjunos_os_evolved
22.3:r3
juniperjunos_os_evolved
22.3:r3-s1
juniperjunos_os_evolved
22.3:r3-s2
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
juniperjunos_os_evolved
22.4:r1-s1
juniperjunos_os_evolved
22.4:r1-s2
juniperjunos_os_evolved
22.4:r2
juniperjunos_os_evolved
22.4:r2-s1
juniperjunos_os_evolved
22.4:r2-s2
juniperjunos_os_evolved
23.2
juniperjunos_os_evolved
23.2:r1
juniperjunos_os_evolved
23.2:r1-s1
juniperjunos_os_evolved
23.2:r1-s2
𝑥
= Vulnerable software versions