Lucene search

K
cvelistJuniperCVELIST:CVE-2024-30401
HistoryApr 12, 2024 - 3:26 p.m.

CVE-2024-30401 Junos OS: MX Series and EX9200-15C: Stack-based buffer overflow in aftman

2024-04-1215:26:58
CWE-125
juniper
www.cve.org
5
juniper networks
junos os
mx series
ex9200-15c
stack-based buffer overflow
aftman
fpc reboot
out-of-bounds read
vulnerability
mpc10e
mpc11
mx10k-lc9600
mx304
ex9200-15c
21.2
21.4
22.1
22.2
20.3r1
20.4

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

17.0%

An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buffer overflow, leading to a reboot of the FPC.

Through code review, it was determined that the interface definition code for aftman could read beyond a buffer boundary, leading to a stack-based buffer overflow.
This issue affects Junos OS on MX Series and EX9200-15C:

  • from 21.2 before 21.2R3-S1,
  • from 21.4 before 21.4R3,
  • from 22.1 before 22.1R2,
  • from 22.2 before 22.2R2;

This issue does not affect:

  • versions of Junos OS prior toΒ 20.3R1;
  • any version of Junos OS 20.4.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "MX Series",
      "EX9200-15C"
    ],
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "21.2R3-S1",
        "status": "affected",
        "version": "21.2",
        "versionType": "semver"
      },
      {
        "lessThan": "21.4R3",
        "status": "affected",
        "version": "21.4",
        "versionType": "semver"
      },
      {
        "lessThan": "22.1R2",
        "status": "affected",
        "version": "22.1",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R2",
        "status": "affected",
        "version": "22.2",
        "versionType": "semver"
      },
      {
        "lessThan": "20.3R1",
        "status": "unaffected",
        "version": "0",
        "versionType": "semver"
      },
      {
        "status": "unaffected",
        "version": "20.4"
      }
    ]
  }
]

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N

AI Score

6.1

Confidence

High

EPSS

0.001

Percentile

17.0%

Related for CVELIST:CVE-2024-30401