Lucene search

K
vulnrichmentJuniperVULNRICHMENT:CVE-2024-39531
HistoryJul 11, 2024 - 4:04 p.m.

CVE-2024-39531 Junos OS Evolved: ACX 7000 Series: Protocol specific DDoS configuration affects other protocols

2024-07-1116:04:46
CWE-229
juniper
github.com
2
juniper networks
junos os
evolved
acx 7000 series
protocol specific
ddos configuration
improper handling of values
packet forwarding engine
pfe
denial-of-service
dos
vulnerability
unauthenticated attacker
network-based
bandwidth
burst
queue
ospf
isis
limitations
versions

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.3%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

An Improper Handling of Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows a network-based, unauthenticated attacker to cause a Denial-of-Service (DoS).

If a value is configured for DDoS bandwidth or burst parameters for any protocol in
a queue, all protocols which share the same queue will have
their bandwidth or burst value changed to the new value. If, for example, OSPF was configured with a certain bandwidth value, ISIS would also be limited to this value. So inadvertently either the control plane is open for a high level of specific traffic which was supposed to be limited to a lower value, or the limit for a certain protocol is so low that chances to succeed with a volumetric DoS attack are significantly increased.

This issue affects Junos OS Evolved on ACX 7000 Series:

  • All versions before 21.4R3-S7-EVO,
  • 22.1 versions before 22.1R3-S6-EVO,
  • 22.2 versions before 22.2R3-S3-EVO,
  • 22.3 versions before 22.3R3-S3-EVO,
  • 22.4 versions before 22.4R3-S2-EVO,
  • 23.2 versions before 23.2R2-EVO,
  • 23.4

versions

before 23.4R1-S1-EVO, 23.4R2-EVO.

CNA Affected

[
  {
    "vendor": "Juniper Networks",
    "product": "Junos OS Evolved",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "21.4R3-S7-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.1",
        "lessThan": "22.1R3-S6-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.2",
        "lessThan": "22.2R3-S3-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.3",
        "lessThan": "22.3R3-S3-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.4",
        "lessThan": "22.4R3-S2-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "23.2",
        "lessThan": "23.2R2-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "23.4",
        "lessThan": "23.4R1-S1-EVO, 23.4R2-EVO",
        "versionType": "semver"
      }
    ],
    "platforms": [
      "ACX 7000 Series"
    ],
    "defaultStatus": "unaffected"
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*"
    ],
    "vendor": "juniper",
    "product": "junos_os_evolved",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "21.4R3-S7-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.1",
        "lessThan": "22.1R3-S6-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.2",
        "lessThan": "22.2R3-S3-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.3",
        "lessThan": "22.3R3-S3-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "22.4",
        "lessThan": "22.4R3-S2-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "23.2",
        "lessThan": "23.2R2-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "23.4",
        "lessThan": "23.4R1-S1-EVO",
        "versionType": "semver"
      },
      {
        "status": "affected",
        "version": "23.4",
        "lessThan": "23.4R2-EVO",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS4

8.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:L

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.3%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-39531