Lucene search

K
vulnrichmentJuniperVULNRICHMENT:CVE-2024-30409
HistoryApr 12, 2024 - 3:03 p.m.

CVE-2024-30409 Junos OS and Junos OS Evolved: Higher CPU consumption on routing engine leads to Denial of Service (DoS).

2024-04-1215:03:21
CWE-754
juniper
github.com
4
improper check
unusual conditions
telemetry processing
juniper networks
junos os
junos os evolved
limited denial of service

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:L/SA:N

AI Score

6.5

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated attacker to cause the forwarding information base telemetry daemon (fibtd) to crash, leading to a limited Denial of Service.

This issue affects Juniper Networks

Junos OS:

  • from 22.1 before 22.1R1-S2, 22.1R2.

Junos OS Evolved:

  • from 22.1 before 22.1R1-S2-EVO, 22.1R2-EVO.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:juniper:junos:22.1:*:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos",
    "versions": [
      {
        "status": "affected",
        "version": "22.1",
        "lessThan": "22.1r1-s2",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "22.1",
        "lessThan": "22.1r2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:juniper:junos_os_evolved:22.1:*:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos_os_evolved",
    "versions": [
      {
        "status": "affected",
        "version": "22.1",
        "lessThan": "22.1r1-s2",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "22.1",
        "lessThan": "22.1r2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:L/SA:N

AI Score

6.5

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-30409