Vulnerability Description
An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). If an attacker sends high rate of specific ICMP traffic to a device with VXLAN configured, this causes a deadlock of the PFE and results in the device becoming unresponsive. A manual restart will be required to recover the device. This issue only affects EX4100, EX4400, EX4600, QFX5000 Series devices. This issue affects: Juniper Networks Junos OS * 21.4R3 versions earlier than 21.4R3-S4; * 22.1R3 versions earlier than 22.1R3-S3; * 22.2R2 versions earlier than 22.2R3-S1; * 22.3 versions earlier than 22.3R2-S2, 22.3R3; * 22.4 versions earlier than 22.4R2; * 23.1 versions earlier than 23.1R2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Juniper | Junos | 21.4 |
| Juniper | Ex4100 | - |
| Juniper | Ex4400 | - |
| Juniper | Ex4600 | - |
| Juniper | Qfx5100 | - |
| Juniper | Qfx5100-96S | - |
| Juniper | Qfx5110 | - |
| Juniper | Qfx5120 | - |
| Juniper | Qfx5130 | - |
| Juniper | Qfx5200 | - |
| Juniper | Qfx5200-32C | - |
| Juniper | Qfx5200-48Y | - |
| Juniper | Qfx5210 | - |
| Juniper | Qfx5210-64C | - |
| Juniper | Qfx5220 | - |
| Juniper | Qfx5700 | - |
Related Weaknesses (CWE)
References
- https://advisory.juniper.net/JSA75734Vendor Advisory
- https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:NThird Party Advisory
- https://advisory.juniper.net/JSA75734Vendor Advisory
- https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:NThird Party Advisory
FAQ
What is CVE-2024-21595?
CVE-2024-21595 is a vulnerability with a CVSS score of 7.5 (HIGH). An Improper Validation of Syntactic Correctness of Input vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a D...
How severe is CVE-2024-21595?
CVE-2024-21595 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-21595?
Check the references section above for vendor advisories and patch information. Affected products include: Juniper Junos, Juniper Ex4100, Juniper Ex4400, Juniper Ex4600, Juniper Qfx5100.