Lucene search

K
cve[email protected]CVE-2024-21599
HistoryJan 12, 2024 - 1:15 a.m.

CVE-2024-21599

2024-01-1201:15:47
CWE-401
CWE-401
web.nvd.nist.gov
14
cve-2024-21599
juniper networks
junos os
packet forwarding engine
pfe
mx series
denial of service
memory leak
vulnerability

6.5 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

3.3 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

0.0005 Low

EPSS

Percentile

17.1%

A Missing Release of Memory after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series allows an adjacent, unauthenticated attacker to cause a Denial of Service (DoS).

If an MX Series device receives PTP packets on an MPC3E that doesn’t support PTP this causes a memory leak which will result in unpredictable behavior and ultimately in an MPC crash and restart.

To monitor for this issue, please use the following FPC vty level commands:

show heap
shows an increase in “LAN buffer” utilization and

show clksync ptp nbr-upd-info
shows non-zero “Pending PFEs” counter.

This issue affects Juniper Networks Junos OS on MX Series with MPC3E:

  • All versions earlier than 20.4R3-S3;
  • 21.1 versions earlier than 21.1R3-S4;
  • 21.2 versions earlier than 21.2R3;
  • 21.3 versions earlier than 21.3R2-S1, 21.3R3;
  • 21.4 versions earlier than 21.4R2;
  • 22.1 versions earlier than 22.1R2.
CPENameOperatorVersion
juniper:junosjuniper junoseq20.4

6.5 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

3.3 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2024-21599