Lucene search

K
cvelistJuniperCVELIST:CVE-2024-39530
HistoryJul 11, 2024 - 4:04 p.m.

CVE-2024-39530 Junos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash

2024-07-1116:04:13
CWE-754
juniper
www.cve.org
4
juniper networks
chassisd
dos
vulnerability
versions
outage

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

EPSS

0.001

Percentile

17.7%

An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a

Denial-of-Service (DoS).

If an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage.

This issue affects Junos OS:

  • 21.4 versions from 21.4R3 before 21.4R3-S5,
  • 22.1 versions from 22.1R3 before 22.1R3-S4,
  • 22.2 versions from 22.2R2 before 22.2R3,
  • 22.3 versions from 22.3R1 before 22.3R2-S2, 22.3R3,
  • 22.4 versions from 22.4R1 before 22.4R2.

This issue does not affect Junos OS versions earlier than 21.4.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Junos OS",
    "vendor": "Juniper Networks",
    "versions": [
      {
        "lessThan": "21.4R3-S5",
        "status": "affected",
        "version": "21.4R3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.1R3-S4",
        "status": "affected",
        "version": "22.1R3",
        "versionType": "semver"
      },
      {
        "lessThan": "22.2R3",
        "status": "affected",
        "version": "22.2R2",
        "versionType": "semver"
      },
      {
        "lessThan": "22.3R2-S2, 22.3R3",
        "status": "affected",
        "version": "22.3R1",
        "versionType": "semver"
      },
      {
        "lessThan": "22.4R2",
        "status": "affected",
        "version": "22.4R1",
        "versionType": "semver"
      },
      {
        "lessThan": "21.4",
        "status": "unaffected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

EPSS

0.001

Percentile

17.7%

Related for CVELIST:CVE-2024-39530