CVE-2024-47504
EUVD-2024-4250711.10.2024, 16:15
An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos). When a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart. This issue affects Junos OS: * 22.1 releases 22.1R1 and later before 22.2R3-S5, * 22.3 releases before 22.3R3-S4, * 22.4 releases before 22.4R3-S4, * 23.2 releases before 23.2R2-S2, * 23.4 releases before 23.4R2-S1, * 24.2 releases before 24.2R1-S1, 24.2R2. Please note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| juniper | junos | 22.2r3-s5 < 𝑥 < 22.2r3-s5 |
| juniper | junos | 22.3r3-s4 < 𝑥 < 22.3r3-s4 |
| juniper | junos | 22.4r3-s4 < 𝑥 < 22.4r3-s4 |
| juniper | junos | 23.2r2-s2 < 𝑥 < 23.2r2-s2 |
| juniper | junos | 23.4r2-s1 < 𝑥 < 23.4r2-s1 |
| juniper | junos | 24.2r1-s1 < 𝑥 < 24.2r1-s1 |
| juniper | junos | 24.2r2 < 𝑥 < 24.2r2 |
| juniper | junos | 22.1:r1 |
| juniper | junos | 22.1:r1-s1 |
| juniper | junos | 22.1:r1-s2 |
| juniper | junos | 22.1:r2 |
| juniper | junos | 22.1:r2-s1 |
| juniper | junos | 22.1:r2-s2 |
| juniper | junos | 22.1:r3 |
| juniper | junos | 22.1:r3-s1 |
| juniper | junos | 22.1:r3-s2 |
| juniper | junos | 22.1:r3-s3 |
| juniper | junos | 22.1:r3-s4 |
| juniper | junos | 22.3 |
| juniper | junos | 22.3:r1 |
| juniper | junos | 22.3:r1-s1 |
| juniper | junos | 22.3:r1-s2 |
| juniper | junos | 22.3:r2 |
| juniper | junos | 22.3:r2-s1 |
| juniper | junos | 22.3:r2-s2 |
| juniper | junos | 22.3:r3 |
| juniper | junos | 22.3:r3-s1 |
| juniper | junos | 22.3:r3-s2 |
| juniper | junos | 22.3:r3-s3 |
| juniper | junos | 22.4 |
| juniper | junos | 22.4:r1 |
| juniper | junos | 22.4:r1-s1 |
| juniper | junos | 22.4:r1-s2 |
| juniper | junos | 22.4:r2 |
| juniper | junos | 22.4:r2-s1 |
| juniper | junos | 22.4:r2-s2 |
| juniper | junos | 22.4:r3 |
| juniper | junos | 22.4:r3-s1 |
| juniper | junos | 22.4:r3-s2 |
| juniper | junos | 22.4:r3-s3 |
| juniper | junos | 23.2 |
| juniper | junos | 23.2:r1 |
| juniper | junos | 23.2:r1-s1 |
| juniper | junos | 23.2:r1-s2 |
| juniper | junos | 23.2:r2 |
| juniper | junos | 23.2:r2-s1 |
| juniper | junos | 23.4 |
| juniper | junos | 23.4:r1 |
| juniper | junos | 23.4:r1-s1 |
| juniper | junos | 23.4:r1-s2 |
| juniper | junos | 23.4:r2 |
| juniper | junos | 24.2 |
| juniper | junos | 24.2:r1 |
| juniper | junos | 24.2:r2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration