CVE-2024-39517

An Improper Check for Unusual or Exceptional Conditions vulnerability in theLayer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).

In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services.

This issue affects both IPv4 and IPv6 implementations.
This issue affects
Junos OS:
All versions earlier than21.4R3-S7;
22.1versions earlier than 22.1R3-S5;
22.2 versions earlier than22.2R3-S3;
22.3 versions earlier than22.3R3-S3;
22.4 versions earlier than22.4R3-S2;
23.2 versions earlier than23.2R2;
23.4 versions earlier than23.4R1-S1.

Junos OS Evolved:
All versions earlier than21.4R3-S7-EVO;
22.1-EVO versions earlier than22.1R3-S5-EVO;
22.2-EVO versions earlier than22.2R3-S3-EVO;
22.3-EVO versions earlier than 22.3R3-S3-EVO;
22.4-EVO versions earlier than22.4R3-S2-EVO;
23.2-EVO versions earlier than23.2R2-EVO;
23.4-EVO versions earlier than23.4R1-S1-EVO, 23.4R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
juniperCNA
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
juniperjunos
𝑥
< 21.4
juniperjunos
21.4
juniperjunos
21.4:r1
juniperjunos
21.4:r1-s1
juniperjunos
21.4:r1-s2
juniperjunos
21.4:r2
juniperjunos
21.4:r2-s1
juniperjunos
21.4:r2-s2
juniperjunos
21.4:r3
juniperjunos
21.4:r3-s1
juniperjunos
21.4:r3-s2
juniperjunos
21.4:r3-s3
juniperjunos
21.4:r3-s4
juniperjunos
21.4:r3-s5
juniperjunos
21.4:r3-s6
juniperjunos
22.1
juniperjunos
22.1:r1
juniperjunos
22.1:r1-s1
juniperjunos
22.1:r1-s2
juniperjunos
22.1:r2
juniperjunos
22.1:r2-s1
juniperjunos
22.1:r2-s2
juniperjunos
22.1:r3
juniperjunos
22.1:r3-s1
juniperjunos
22.1:r3-s2
juniperjunos
22.1:r3-s3
juniperjunos
22.1:r3-s4
juniperjunos
22.2
juniperjunos
22.2:r1
juniperjunos
22.2:r1-s1
juniperjunos
22.2:r1-s2
juniperjunos
22.2:r2
juniperjunos
22.2:r2-s1
juniperjunos
22.2:r2-s2
juniperjunos
22.2:r3
juniperjunos
22.2:r3-s1
juniperjunos
22.2:r3-s2
juniperjunos
22.3
juniperjunos
22.3:r1
juniperjunos
22.3:r1-s1
juniperjunos
22.3:r1-s2
juniperjunos
22.3:r2
juniperjunos
22.3:r2-s1
juniperjunos
22.3:r2-s2
juniperjunos
22.3:r3
juniperjunos
22.3:r3-s1
juniperjunos
22.3:r3-s2
juniperjunos
22.4
juniperjunos
22.4:r1
juniperjunos
22.4:r1-s1
juniperjunos
22.4:r1-s2
juniperjunos
22.4:r2
juniperjunos
22.4:r2-s1
juniperjunos
22.4:r2-s2
juniperjunos
22.4:r3
juniperjunos
22.4:r3-s1
juniperjunos
23.2
juniperjunos
23.2:r1
juniperjunos
23.2:r1-s1
juniperjunos
23.2:r1-s2
juniperjunos
23.4
juniperjunos
23.4:r1
juniperjunos_os_evolved
𝑥
< 21.4
juniperjunos_os_evolved
21.4
juniperjunos_os_evolved
21.4:r1
juniperjunos_os_evolved
21.4:r1-s1
juniperjunos_os_evolved
21.4:r1-s2
juniperjunos_os_evolved
21.4:r2
juniperjunos_os_evolved
21.4:r2-s1
juniperjunos_os_evolved
21.4:r2-s2
juniperjunos_os_evolved
21.4:r3
juniperjunos_os_evolved
21.4:r3-s1
juniperjunos_os_evolved
21.4:r3-s2
juniperjunos_os_evolved
21.4:r3-s3
juniperjunos_os_evolved
21.4:r3-s4
juniperjunos_os_evolved
21.4:r3-s5
juniperjunos_os_evolved
21.4:r3-s6
juniperjunos_os_evolved
22.1
juniperjunos_os_evolved
22.1:r1
juniperjunos_os_evolved
22.1:r1-s1
juniperjunos_os_evolved
22.1:r1-s2
juniperjunos_os_evolved
22.1:r2
juniperjunos_os_evolved
22.1:r2-s1
juniperjunos_os_evolved
22.1:r3
juniperjunos_os_evolved
22.1:r3-s1
juniperjunos_os_evolved
22.1:r3-s2
juniperjunos_os_evolved
22.1:r3-s3
juniperjunos_os_evolved
22.1:r3-s4
juniperjunos_os_evolved
22.2
juniperjunos_os_evolved
22.2:r1
juniperjunos_os_evolved
22.2:r1-s1
juniperjunos_os_evolved
22.2:r1-s2
juniperjunos_os_evolved
22.2:r2
juniperjunos_os_evolved
22.2:r2-s1
juniperjunos_os_evolved
22.2:r2-s2
juniperjunos_os_evolved
22.2:r3
juniperjunos_os_evolved
22.2:r3-s1
juniperjunos_os_evolved
22.2:r3-s2
juniperjunos_os_evolved
22.3
juniperjunos_os_evolved
22.3:r1
juniperjunos_os_evolved
22.3:r1-s1
juniperjunos_os_evolved
22.3:r1-s2
juniperjunos_os_evolved
22.3:r2
juniperjunos_os_evolved
22.3:r2-s1
juniperjunos_os_evolved
22.3:r2-s2
juniperjunos_os_evolved
22.3:r3
juniperjunos_os_evolved
22.3:r3-s1
juniperjunos_os_evolved
22.3:r3-s2
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
juniperjunos_os_evolved
22.4:r1-s1
juniperjunos_os_evolved
22.4:r1-s2
juniperjunos_os_evolved
22.4:r2
juniperjunos_os_evolved
22.4:r2-s1
juniperjunos_os_evolved
22.4:r2-s2
juniperjunos_os_evolved
22.4:r3
juniperjunos_os_evolved
22.4:r3-s1
juniperjunos_os_evolved
23.2
juniperjunos_os_evolved
23.2:r1
juniperjunos_os_evolved
23.2:r1-s1
juniperjunos_os_evolved
23.2:r1-s2
juniperjunos_os_evolved
23.4
juniperjunos_os_evolved
23.4:r1
𝑥
= Vulnerable software versions