Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21604— Junos OS Evolved: A high rate of specific traffic will cause a complete system outage

CVSS 7.5 · High EPSS 0.29% · P52
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-21604

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Junos OS Evolved: A high rate of specific traffic will cause a complete system outage
Source: NVD (National Vulnerability Database)
Vulnerability Description
An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). If a high rate of specific valid packets are processed by the routing engine (RE) this will lead to a loss of connectivity of the RE with other components of the chassis and thereby a complete and persistent system outage. Please note that a carefully designed lo0 firewall filter will block or limit these packets which should prevent this issue from occurring. The following log messages can be seen when this issue occurs: <host> kernel: nf_conntrack: nf_conntrack: table full, dropping packet This issue affects Juniper Networks Junos OS Evolved: * All versions earlier than 20.4R3-S7-EVO; * 21.2R1-EVO and later versions; * 21.4-EVO versions earlier than 21.4R3-S5-EVO; * 22.1-EVO versions earlier than 22.1R3-S2-EVO; * 22.2-EVO versions earlier than 22.2R3-EVO; * 22.3-EVO versions earlier than 22.3R2-EVO; * 22.4-EVO versions earlier than 22.4R2-EVO.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
不加限制或调节的资源分配
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper Networks Junos OS Evolved 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper Networks Junos OS Evolved是美国瞻博网络(Juniper Networks)公司的Junos OS 的升级版系统。 Juniper Networks Junos OS Evolved 存在安全漏洞,该漏洞源于存在无限制资源分配或限制漏洞。允许未经身份验证的基于网络的攻击者造成拒绝服务 (DoS)。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Juniper NetworksJunos OS Evolved 0 ~ 20.4R3-S7-EVO -

II. Public POCs for CVE-2024-21604

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-21604

登录查看更多情报信息。

Same Patch Batch · Juniper Networks · 2024-01-12 · 23 CVEs total

CVE-2024-215919.8 CRITICALJunos OS: SRX Series and EX Series: Security Vulnerability in J-web allows a preAuth Remot
CVE-2024-216167.5 HIGHJunos OS: MX Series and SRX Series: Processing of a specific SIP packet causes NAT IP allo
CVE-2024-216147.5 HIGHJunos OS and Junos OS Evolved: A specific query via DREND causes rpd crash
CVE-2024-216127.5 HIGHJunos OS Evolved: Specific TCP traffic causes OFP core and restart of RE
CVE-2024-216117.5 HIGHJunos OS and Junos OS Evolved: In a jflow scenario continuous route churn will cause a mem
CVE-2024-216067.5 HIGHJunos OS: SRX Series: When "tcp-encap" is configured and specific packets are received flo
CVE-2024-216027.5 HIGHJunos OS Evolved: ACX7024, ACX7100-32C and ACX7100-48L: Traffic stops when a specific IPv4
CVE-2024-215957.5 HIGHJunos OS: EX4100, EX4400, EX4600, QFX5000 Series: A high rate of specific ICMP traffic wil
CVE-2024-215897.4 HIGHParagon Active Assurance Control Center: Information disclosure vulnerability
CVE-2023-368426.5 MEDIUMJunos OS: jdhcpd will hang on receiving a specific DHCP packet
CVE-2024-216176.5 MEDIUMJunos OS: BGP flap on NSR-enabled devices causes memory leak
CVE-2024-215876.5 MEDIUMJunos OS: MX Series: Memory leak in bbe-smgd process if BFD liveness detection for DHCP su
CVE-2024-215996.5 MEDIUMJunos OS: MX Series: MPC3E memory leak with PTP configuration
CVE-2024-216006.5 MEDIUMJunos OS: PTX Series: In an FTI scenario MPLS packets hitting reject next-hop will cause a
CVE-2024-216036.5 MEDIUMJunos OS: MX Series: Gathering statistics in a scaled SCU/DCU configuration will lead to a
CVE-2024-216136.5 MEDIUMJunos OS and Junos OS Evolved: A link flap causes patroot memory leak which leads to rpd c
CVE-2024-216015.9 MEDIUMJunos OS: SRX Series: Due to an error in processing TCP events flowd will crash
CVE-2024-215855.9 MEDIUMJunos OS and Junos OS Evolved: BGP session flaps on NSR-enabled devices can cause rpd cras
CVE-2024-215945.5 MEDIUMJunos OS: SRX 5000 Series: Repeated execution of a specific CLI command causes a flowd cra
CVE-2024-215975.3 MEDIUMJunos OS: MX Series: In an AF scenario traffic can bypass configured lo0 firewall filters

Showing top 20 of 23 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-21604

No comments yet


Leave a comment