Lucene search

K
nvd[email protected]NVD:CVE-2024-39528
HistoryJul 11, 2024 - 4:15 p.m.

CVE-2024-39528

2024-07-1116:15:04
CWE-416
web.nvd.nist.gov
4
juniper networks
junos os
junos os evolved
use after free
denial of service
authenticated
network-based attacker

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

EPSS

0

Percentile

13.7%

A Use After Free vulnerability in the Routing Protocol Daemon (rpd) ofย Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to cause a Denial of Service (DoS).On all Junos OS and Junos Evolved platforms, if a routing-instance deactivation is triggered, and at the same time a specific SNMP request is received, a segmentation fault occurs which causes rpd to crash and restart.

This issue affects:

Junos OS:

  • All versions before 21.2R3-S8,
  • 21.4 versions before 21.4R3-S5,
  • 22.2 versions before 22.2R3-S3,
  • 22.3 versions before 22.3R3-S2,
  • 22.4 versions before 22.4R3,
  • 23.2 versions before 23.2R2.

Junos OS Evolved:

  • All versions before 21.2R3-S8-EVO,
  • 21.4-EVO versions before 21.4R3-S5-EVO,
  • 22.2-EVO versions before 22.2R3-S3-EVO,
  • 22.3-EVO versions before 22.3R3-S2-EVO,
  • 22.4-EVO versions before 22.4R3-EVO,
  • 23.2-EVO versions before 23.2R2-EVO.

Affected configurations

Nvd
Node
juniperjunosRange<21.2
OR
juniperjunosMatch21.2-
OR
juniperjunosMatch21.2r1
OR
juniperjunosMatch21.2r1-s1
OR
juniperjunosMatch21.2r1-s2
OR
juniperjunosMatch21.2r2
OR
juniperjunosMatch21.2r2-s1
OR
juniperjunosMatch21.2r2-s2
OR
juniperjunosMatch21.2r3
OR
juniperjunosMatch21.2r3-s1
OR
juniperjunosMatch21.2r3-s2
OR
juniperjunosMatch21.2r3-s3
OR
juniperjunosMatch21.2r3-s4
OR
juniperjunosMatch21.2r3-s5
OR
juniperjunosMatch21.2r3-s6
OR
juniperjunosMatch21.2r3-s7
Node
juniperjunosMatch21.4-
OR
juniperjunosMatch21.4r1
OR
juniperjunosMatch21.4r1-s1
OR
juniperjunosMatch21.4r1-s2
OR
juniperjunosMatch21.4r2
OR
juniperjunosMatch21.4r2-s1
OR
juniperjunosMatch21.4r2-s2
OR
juniperjunosMatch21.4r3
OR
juniperjunosMatch21.4r3-s1
OR
juniperjunosMatch21.4r3-s2
OR
juniperjunosMatch21.4r3-s3
OR
juniperjunosMatch21.4r3-s4
Node
juniperjunosMatch22.2-
OR
juniperjunosMatch22.2r1
OR
juniperjunosMatch22.2r1-s1
OR
juniperjunosMatch22.2r1-s2
OR
juniperjunosMatch22.2r2
OR
juniperjunosMatch22.2r2-s1
OR
juniperjunosMatch22.2r2-s2
OR
juniperjunosMatch22.2r3
OR
juniperjunosMatch22.2r3-s1
OR
juniperjunosMatch22.2r3-s2
Node
juniperjunosMatch22.3-
OR
juniperjunosMatch22.3r1
OR
juniperjunosMatch22.3r1-s1
OR
juniperjunosMatch22.3r1-s2
OR
juniperjunosMatch22.3r2
OR
juniperjunosMatch22.3r2-s1
OR
juniperjunosMatch22.3r2-s2
OR
juniperjunosMatch22.3r3
OR
juniperjunosMatch22.3r3-s1
Node
juniperjunosMatch22.4-
OR
juniperjunosMatch22.4r1
OR
juniperjunosMatch22.4r1-s1
OR
juniperjunosMatch22.4r1-s2
OR
juniperjunosMatch22.4r2
OR
juniperjunosMatch22.4r2-s1
OR
juniperjunosMatch22.4r2-s2
Node
juniperjunosMatch23.2-
OR
juniperjunosMatch23.2r1
OR
juniperjunosMatch23.2r1-s1
OR
juniperjunosMatch23.2r1-s2
Node
juniperjunos_os_evolvedRange<21.2
OR
juniperjunos_os_evolvedMatch21.2-
OR
juniperjunos_os_evolvedMatch21.2r1
OR
juniperjunos_os_evolvedMatch21.2r1-s1
OR
juniperjunos_os_evolvedMatch21.2r1-s2
OR
juniperjunos_os_evolvedMatch21.2r2
OR
juniperjunos_os_evolvedMatch21.2r2-s1
OR
juniperjunos_os_evolvedMatch21.2r2-s2
OR
juniperjunos_os_evolvedMatch21.2r3
OR
juniperjunos_os_evolvedMatch21.2r3-s1
OR
juniperjunos_os_evolvedMatch21.2r3-s2
OR
juniperjunos_os_evolvedMatch21.2r3-s3
OR
juniperjunos_os_evolvedMatch21.2r3-s4
OR
juniperjunos_os_evolvedMatch21.2r3-s5
OR
juniperjunos_os_evolvedMatch21.2r3-s6
OR
juniperjunos_os_evolvedMatch21.2r3-s7
OR
juniperjunos_os_evolvedMatch21.4-
OR
juniperjunos_os_evolvedMatch21.4r1
OR
juniperjunos_os_evolvedMatch21.4r1-s1
OR
juniperjunos_os_evolvedMatch21.4r1-s2
OR
juniperjunos_os_evolvedMatch21.4r2
OR
juniperjunos_os_evolvedMatch21.4r2-s1
OR
juniperjunos_os_evolvedMatch21.4r2-s2
OR
juniperjunos_os_evolvedMatch21.4r3
OR
juniperjunos_os_evolvedMatch21.4r3-s1
OR
juniperjunos_os_evolvedMatch21.4r3-s2
OR
juniperjunos_os_evolvedMatch21.4r3-s3
OR
juniperjunos_os_evolvedMatch21.4r3-s4
OR
juniperjunos_os_evolvedMatch22.2-
OR
juniperjunos_os_evolvedMatch22.2r1
OR
juniperjunos_os_evolvedMatch22.2r1-s1
OR
juniperjunos_os_evolvedMatch22.2r1-s2
OR
juniperjunos_os_evolvedMatch22.2r2
OR
juniperjunos_os_evolvedMatch22.2r2-s1
OR
juniperjunos_os_evolvedMatch22.2r2-s2
OR
juniperjunos_os_evolvedMatch22.2r3
OR
juniperjunos_os_evolvedMatch22.2r3-s1
OR
juniperjunos_os_evolvedMatch22.2r3-s2
OR
juniperjunos_os_evolvedMatch22.4-
OR
juniperjunos_os_evolvedMatch22.4r1
OR
juniperjunos_os_evolvedMatch22.4r1-s1
OR
juniperjunos_os_evolvedMatch22.4r1-s2
OR
juniperjunos_os_evolvedMatch22.4r2
OR
juniperjunos_os_evolvedMatch22.4r2-s1
OR
juniperjunos_os_evolvedMatch22.4r2-s2
OR
juniperjunos_os_evolvedMatch23.2-
OR
juniperjunos_os_evolvedMatch23.2r1
OR
juniperjunos_os_evolvedMatch23.2r1-s1
OR
juniperjunos_os_evolvedMatch23.2r1-s2
VendorProductVersionCPE
juniperjunos*cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
juniperjunos21.2cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*
Rows per page:
1-10 of 1071

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

EPSS

0

Percentile

13.7%

Related for NVD:CVE-2024-39528