Lucene search

K
cveJuniperCVE-2024-39530
HistoryJul 11, 2024 - 4:15 p.m.

CVE-2024-39530

2024-07-1116:15:04
CWE-754
juniper
web.nvd.nist.gov
41
improper check vulnerability
unauthenticated
denial-of-service
juniper networks junos os
chassisd
grpc
netconf

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

EPSS

0.001

Percentile

17.7%

An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a

Denial-of-Service (DoS).

If an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage.

This issue affects Junos OS:

  • 21.4 versions from 21.4R3 before 21.4R3-S5,
  • 22.1 versions from 22.1R3 before 22.1R3-S4,
  • 22.2 versions from 22.2R2 before 22.2R3,
  • 22.3 versions from 22.3R1 before 22.3R2-S2, 22.3R3,
  • 22.4 versions from 22.4R1 before 22.4R2.

This issue does not affect Junos OS versions earlier than 21.4.

Affected configurations

Nvd
Node
juniperjunosMatch21.4r3
OR
juniperjunosMatch21.4r3-s1
OR
juniperjunosMatch21.4r3-s2
OR
juniperjunosMatch21.4r3-s3
OR
juniperjunosMatch21.4r3-s4
Node
juniperjunosMatch21.1r3
OR
juniperjunosMatch21.1r3-s1
OR
juniperjunosMatch21.1r3-s2
OR
juniperjunosMatch21.1r3-s3
Node
juniperjunosMatch22.2r2
OR
juniperjunosMatch22.2r2-s1
OR
juniperjunosMatch22.2r2-s2
Node
juniperjunosMatch22.3r1
OR
juniperjunosMatch22.3r1-s1
OR
juniperjunosMatch22.3r1-s2
OR
juniperjunosMatch22.3r2
OR
juniperjunosMatch22.3r2-s1
Node
juniperjunosMatch22.4r1
OR
juniperjunosMatch22.4r1-s1
OR
juniperjunosMatch22.4r1-s2
VendorProductVersionCPE
juniperjunos21.4cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*
juniperjunos21.4cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*
juniperjunos21.4cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*
juniperjunos21.4cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*
juniperjunos21.4cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*
juniperjunos21.1cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*
juniperjunos21.1cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*
juniperjunos21.1cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*
juniperjunos21.1cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*
juniperjunos22.2cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*
Rows per page:
1-10 of 201

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "21.4R3-S5",
        "status": "affected",
        "version": "21.4R3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.1R3-S4",
        "status": "affected",
        "version": "22.1R3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R3",
        "status": "affected",
        "version": "22.2R2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R2-S2, 22.3R3",
        "status": "affected",
        "version": "22.3R1",
        "versionType": "semver"
      },
      {
        "lessThan": "22.4R2",
        "status": "affected",
        "version": "22.4R1",
        "versionType": "semver"
      },
      {
        "lessThan": "21.4",
        "status": "unaffected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

EPSS

0.001

Percentile

17.7%

Related for CVE-2024-39530