CVE-2024-39517
10.07.2024, 23:15
An Improper Check for Unusual or Exceptional Conditions vulnerability in theLayer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services. This issue affects both IPv4 and IPv6 implementations. This issue affects Junos OS: All versions earlier than21.4R3-S7; 22.1versions earlier than 22.1R3-S5; 22.2 versions earlier than22.2R3-S3; 22.3 versions earlier than22.3R3-S3; 22.4 versions earlier than22.4R3-S2; 23.2 versions earlier than23.2R2; 23.4 versions earlier than23.4R1-S1. Junos OS Evolved: All versions earlier than21.4R3-S7-EVO; 22.1-EVO versions earlier than22.1R3-S5-EVO; 22.2-EVO versions earlier than22.2R3-S3-EVO; 22.3-EVO versions earlier than 22.3R3-S3-EVO; 22.4-EVO versions earlier than22.4R3-S2-EVO; 23.2-EVO versions earlier than23.2R2-EVO; 23.4-EVO versions earlier than23.4R1-S1-EVO, 23.4R2-EVO.Enginsight
Vendor | Product | Version |
---|---|---|
juniper | junos | 𝑥 < 21.4 |
juniper | junos | 21.4 |
juniper | junos | 21.4:r1 |
juniper | junos | 21.4:r1-s1 |
juniper | junos | 21.4:r1-s2 |
juniper | junos | 21.4:r2 |
juniper | junos | 21.4:r2-s1 |
juniper | junos | 21.4:r2-s2 |
juniper | junos | 21.4:r3 |
juniper | junos | 21.4:r3-s1 |
juniper | junos | 21.4:r3-s2 |
juniper | junos | 21.4:r3-s3 |
juniper | junos | 21.4:r3-s4 |
juniper | junos | 21.4:r3-s5 |
juniper | junos | 21.4:r3-s6 |
juniper | junos | 22.1 |
juniper | junos | 22.1:r1 |
juniper | junos | 22.1:r1-s1 |
juniper | junos | 22.1:r1-s2 |
juniper | junos | 22.1:r2 |
juniper | junos | 22.1:r2-s1 |
juniper | junos | 22.1:r2-s2 |
juniper | junos | 22.1:r3 |
juniper | junos | 22.1:r3-s1 |
juniper | junos | 22.1:r3-s2 |
juniper | junos | 22.1:r3-s3 |
juniper | junos | 22.1:r3-s4 |
juniper | junos | 22.2 |
juniper | junos | 22.2:r1 |
juniper | junos | 22.2:r1-s1 |
juniper | junos | 22.2:r1-s2 |
juniper | junos | 22.2:r2 |
juniper | junos | 22.2:r2-s1 |
juniper | junos | 22.2:r2-s2 |
juniper | junos | 22.2:r3 |
juniper | junos | 22.2:r3-s1 |
juniper | junos | 22.2:r3-s2 |
juniper | junos | 22.3 |
juniper | junos | 22.3:r1 |
juniper | junos | 22.3:r1-s1 |
juniper | junos | 22.3:r1-s2 |
juniper | junos | 22.3:r2 |
juniper | junos | 22.3:r2-s1 |
juniper | junos | 22.3:r2-s2 |
juniper | junos | 22.3:r3 |
juniper | junos | 22.3:r3-s1 |
juniper | junos | 22.3:r3-s2 |
juniper | junos | 22.4 |
juniper | junos | 22.4:r1 |
juniper | junos | 22.4:r1-s1 |
juniper | junos | 22.4:r1-s2 |
juniper | junos | 22.4:r2 |
juniper | junos | 22.4:r2-s1 |
juniper | junos | 22.4:r2-s2 |
juniper | junos | 22.4:r3 |
juniper | junos | 22.4:r3-s1 |
juniper | junos | 23.2 |
juniper | junos | 23.2:r1 |
juniper | junos | 23.2:r1-s1 |
juniper | junos | 23.2:r1-s2 |
juniper | junos | 23.4 |
juniper | junos | 23.4:r1 |
juniper | junos_os_evolved | 𝑥 < 21.4 |
juniper | junos_os_evolved | 21.4 |
juniper | junos_os_evolved | 21.4:r1 |
juniper | junos_os_evolved | 21.4:r1-s1 |
juniper | junos_os_evolved | 21.4:r1-s2 |
juniper | junos_os_evolved | 21.4:r2 |
juniper | junos_os_evolved | 21.4:r2-s1 |
juniper | junos_os_evolved | 21.4:r2-s2 |
juniper | junos_os_evolved | 21.4:r3 |
juniper | junos_os_evolved | 21.4:r3-s1 |
juniper | junos_os_evolved | 21.4:r3-s2 |
juniper | junos_os_evolved | 21.4:r3-s3 |
juniper | junos_os_evolved | 21.4:r3-s4 |
juniper | junos_os_evolved | 21.4:r3-s5 |
juniper | junos_os_evolved | 21.4:r3-s6 |
juniper | junos_os_evolved | 22.1 |
juniper | junos_os_evolved | 22.1:r1 |
juniper | junos_os_evolved | 22.1:r1-s1 |
juniper | junos_os_evolved | 22.1:r1-s2 |
juniper | junos_os_evolved | 22.1:r2 |
juniper | junos_os_evolved | 22.1:r2-s1 |
juniper | junos_os_evolved | 22.1:r3 |
juniper | junos_os_evolved | 22.1:r3-s1 |
juniper | junos_os_evolved | 22.1:r3-s2 |
juniper | junos_os_evolved | 22.1:r3-s3 |
juniper | junos_os_evolved | 22.1:r3-s4 |
juniper | junos_os_evolved | 22.2 |
juniper | junos_os_evolved | 22.2:r1 |
juniper | junos_os_evolved | 22.2:r1-s1 |
juniper | junos_os_evolved | 22.2:r1-s2 |
juniper | junos_os_evolved | 22.2:r2 |
juniper | junos_os_evolved | 22.2:r2-s1 |
juniper | junos_os_evolved | 22.2:r2-s2 |
juniper | junos_os_evolved | 22.2:r3 |
juniper | junos_os_evolved | 22.2:r3-s1 |
juniper | junos_os_evolved | 22.2:r3-s2 |
juniper | junos_os_evolved | 22.3 |
juniper | junos_os_evolved | 22.3:r1 |
juniper | junos_os_evolved | 22.3:r1-s1 |
juniper | junos_os_evolved | 22.3:r1-s2 |
juniper | junos_os_evolved | 22.3:r2 |
juniper | junos_os_evolved | 22.3:r2-s1 |
juniper | junos_os_evolved | 22.3:r2-s2 |
juniper | junos_os_evolved | 22.3:r3 |
juniper | junos_os_evolved | 22.3:r3-s1 |
juniper | junos_os_evolved | 22.3:r3-s2 |
juniper | junos_os_evolved | 22.4 |
juniper | junos_os_evolved | 22.4:r1 |
juniper | junos_os_evolved | 22.4:r1-s1 |
juniper | junos_os_evolved | 22.4:r1-s2 |
juniper | junos_os_evolved | 22.4:r2 |
juniper | junos_os_evolved | 22.4:r2-s1 |
juniper | junos_os_evolved | 22.4:r2-s2 |
juniper | junos_os_evolved | 22.4:r3 |
juniper | junos_os_evolved | 22.4:r3-s1 |
juniper | junos_os_evolved | 23.2 |
juniper | junos_os_evolved | 23.2:r1 |
juniper | junos_os_evolved | 23.2:r1-s1 |
juniper | junos_os_evolved | 23.2:r1-s2 |
juniper | junos_os_evolved | 23.4 |
juniper | junos_os_evolved | 23.4:r1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration