CVE-2024-39531
EUVD-2024-3805711.07.2024, 17:15
An Improper Handling of Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows a network-based, unauthenticated attacker to cause a Denial-of-Service (DoS). If a value is configured for DDoS bandwidth or burst parameters for any protocol in a queue, all protocols which share the same queue will have their bandwidth or burst value changed to the new value. If, for example, OSPF was configured with a certain bandwidth value, ISIS would also be limited to this value. So inadvertently either the control plane is open for a high level of specific traffic which was supposed to be limited to a lower value, or the limit for a certain protocol is so low that chances to succeed with a volumetric DoS attack are significantly increased. This issue affects Junos OS Evolved on ACX 7000 Series: * All versions before 21.4R3-S7-EVO, * 22.1 versions before 22.1R3-S6-EVO, * 22.2 versions before 22.2R3-S3-EVO, * 22.3 versions before 22.3R3-S3-EVO, * 22.4 versions before 22.4R3-S2-EVO, * 23.2 versions before 23.2R2-EVO, * 23.4 versions before 23.4R1-S1-EVO, 23.4R2-EVO.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juniper | junos_os_evolved | 𝑥 < 21.4R3-S7-EVO |
| juniper | junos_os_evolved | 22.1R3-S6-EVO < 𝑥 < 22.1R3-S6-EVO |
| juniper | junos_os_evolved | 22.2R3-S3-EVO < 𝑥 < 22.2R3-S3-EVO |
| juniper | junos_os_evolved | 22.3R3-S3-EVO < 𝑥 < 22.3R3-S3-EVO |
| juniper | junos_os_evolved | 22.4R3-S2-EVO < 𝑥 < 22.4R3-S2-EVO |
| juniper | junos_os_evolved | 23.2R2-EVO < 𝑥 < 23.2R2-EVO |
| juniper | junos_os_evolved | 23.4R1-S1-EVO < 𝑥 < 23.4R1-S1-EVO |
| juniper | junos_os_evolved | 23.4R2-EVO < 𝑥 < 23.4R2-EVO |
| juniper | junos_os_evolved | 𝑥 < 21.4 |
| juniper | junos_os_evolved | 21.4 |
| juniper | junos_os_evolved | 21.4:r1 |
| juniper | junos_os_evolved | 21.4:r1-s1 |
| juniper | junos_os_evolved | 21.4:r1-s2 |
| juniper | junos_os_evolved | 21.4:r2 |
| juniper | junos_os_evolved | 21.4:r2-s1 |
| juniper | junos_os_evolved | 21.4:r2-s2 |
| juniper | junos_os_evolved | 21.4:r3 |
| juniper | junos_os_evolved | 21.4:r3-s1 |
| juniper | junos_os_evolved | 21.4:r3-s2 |
| juniper | junos_os_evolved | 21.4:r3-s3 |
| juniper | junos_os_evolved | 21.4:r3-s4 |
| juniper | junos_os_evolved | 21.4:r3-s5 |
| juniper | junos_os_evolved | 21.4:r3-s6 |
| juniper | junos_os_evolved | 22.1 |
| juniper | junos_os_evolved | 22.1:r1 |
| juniper | junos_os_evolved | 22.1:r1-s1 |
| juniper | junos_os_evolved | 22.1:r1-s2 |
| juniper | junos_os_evolved | 22.1:r2 |
| juniper | junos_os_evolved | 22.1:r2-s1 |
| juniper | junos_os_evolved | 22.1:r3 |
| juniper | junos_os_evolved | 22.1:r3-s1 |
| juniper | junos_os_evolved | 22.1:r3-s2 |
| juniper | junos_os_evolved | 22.1:r3-s3 |
| juniper | junos_os_evolved | 22.1:r3-s4 |
| juniper | junos_os_evolved | 22.1:r3-s5 |
| juniper | junos_os_evolved | 22.2 |
| juniper | junos_os_evolved | 22.2:r1 |
| juniper | junos_os_evolved | 22.2:r1-s1 |
| juniper | junos_os_evolved | 22.2:r1-s2 |
| juniper | junos_os_evolved | 22.2:r2 |
| juniper | junos_os_evolved | 22.2:r2-s1 |
| juniper | junos_os_evolved | 22.2:r2-s2 |
| juniper | junos_os_evolved | 22.2:r3 |
| juniper | junos_os_evolved | 22.2:r3-s1 |
| juniper | junos_os_evolved | 22.2:r3-s2 |
| juniper | junos_os_evolved | 22.3 |
| juniper | junos_os_evolved | 22.3:r1 |
| juniper | junos_os_evolved | 22.3:r1-s1 |
| juniper | junos_os_evolved | 22.3:r1-s2 |
| juniper | junos_os_evolved | 22.3:r2 |
| juniper | junos_os_evolved | 22.3:r2-s1 |
| juniper | junos_os_evolved | 22.3:r2-s2 |
| juniper | junos_os_evolved | 22.3:r3 |
| juniper | junos_os_evolved | 22.3:r3-s1 |
| juniper | junos_os_evolved | 22.3:r3-s2 |
| juniper | junos_os_evolved | 22.4 |
| juniper | junos_os_evolved | 22.4:r1 |
| juniper | junos_os_evolved | 22.4:r1-s1 |
| juniper | junos_os_evolved | 22.4:r1-s2 |
| juniper | junos_os_evolved | 22.4:r2 |
| juniper | junos_os_evolved | 22.4:r2-s1 |
| juniper | junos_os_evolved | 22.4:r2-s2 |
| juniper | junos_os_evolved | 22.4:r3 |
| juniper | junos_os_evolved | 22.4:r3-s1 |
| juniper | junos_os_evolved | 23.2 |
| juniper | junos_os_evolved | 23.2:r1 |
| juniper | junos_os_evolved | 23.2:r1-s1 |
| juniper | junos_os_evolved | 23.2:r1-s2 |
| juniper | junos_os_evolved | 23.4 |
| juniper | junos_os_evolved | 23.4:r1 |
| juniper | junos_os_evolved | 23.4:r2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration