CVE-2024-39553

EUVD-2024-38079
An Exposure of Resource to Wrong Sphere vulnerability in the sampling service of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to send arbitrary data to the device, which leads msvcsd process to crash with limited availability impacting Denial of Service (DoS) and allows unauthorized network access to the device, potentially impacting system integrity.

This issue only happens when inline jflow is configured.

This does not impact any forwarding traffic. The impacted services MSVCS-DB app crashes momentarily and recovers by itself. 

This issue affects Juniper Networks Junos OS Evolved: 
  *  21.4 versions earlier than 21.4R3-S7-EVO; 
  *  22.2 versions earlier than 22.2R3-S3-EVO;
  *  22.3 versions earlier than 22.3R3-S2-EVO;
  *  22.4 versions earlier than 22.4R3-EVO;
  *  23.2 versions earlier than 23.2R1-S2-EVO, 23.2R2-EVO.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
juniperjunos_os_evolved
21.4
juniperjunos_os_evolved
21.4:r1
juniperjunos_os_evolved
21.4:r1-s1
juniperjunos_os_evolved
21.4:r1-s2
juniperjunos_os_evolved
21.4:r2
juniperjunos_os_evolved
21.4:r2-s1
juniperjunos_os_evolved
21.4:r2-s2
juniperjunos_os_evolved
21.4:r3
juniperjunos_os_evolved
21.4:r3-s1
juniperjunos_os_evolved
21.4:r3-s2
juniperjunos_os_evolved
21.4:r3-s3
juniperjunos_os_evolved
21.4:r3-s4
juniperjunos_os_evolved
21.4:r3-s5
juniperjunos_os_evolved
21.4:r3-s6
juniperjunos_os_evolved
22.2
juniperjunos_os_evolved
22.2:r1
juniperjunos_os_evolved
22.2:r1-s1
juniperjunos_os_evolved
22.2:r1-s2
juniperjunos_os_evolved
22.2:r2
juniperjunos_os_evolved
22.2:r2-s1
juniperjunos_os_evolved
22.2:r2-s2
juniperjunos_os_evolved
22.2:r3
juniperjunos_os_evolved
22.2:r3-s1
juniperjunos_os_evolved
22.2:r3-s2
juniperjunos_os_evolved
22.3
juniperjunos_os_evolved
22.3:r1
juniperjunos_os_evolved
22.3:r1-s1
juniperjunos_os_evolved
22.3:r1-s2
juniperjunos_os_evolved
22.3:r2
juniperjunos_os_evolved
22.3:r2-s1
juniperjunos_os_evolved
22.3:r2-s2
juniperjunos_os_evolved
22.3:r3
juniperjunos_os_evolved
22.3:r3-s1
juniperjunos_os_evolved
22.4
juniperjunos_os_evolved
22.4:r1
juniperjunos_os_evolved
22.4:r1-s1
juniperjunos_os_evolved
22.4:r1-s2
juniperjunos_os_evolved
22.4:r2
juniperjunos_os_evolved
22.4:r2-s1
juniperjunos_os_evolved
22.4:r2-s2
juniperjunos_os_evolved
23.2
juniperjunos_os_evolved
23.2:r1
juniperjunos_os_evolved
23.2:r1-s1
juniperjunos_os_evolved
23.2:r2
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
juniperjunos_os_evolved
21.4 ≤
𝑥
< 21.4r3-s7
ADP
juniperjunos_os_evolved
22.2 ≤
𝑥
< 22.2r3-s3
ADP
juniperjunos_os_evolved
22.3 ≤
𝑥
< 22.3r3-s2
ADP
juniperjunos_os_evolved
22.4 ≤
𝑥
< 22.4r3
ADP
juniperjunos_os_evolved
23.2 ≤
𝑥
< 23.23r1-s2
ADP