An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).
Specific valid link-local traffic is not blocked on ports in STP blocked state but is instead sent to the control plane of the device. This leads to excessive resource consumption and in turn severe impact on all control and management protocols of the device.
This issue affects Juniper Networks Junos OS:
* 21.2 version 21.2R3-S3 and later versions earlier than 21.2R3-S6;
* 22.1 version 22.1R3 and later versions earlier than 22.1R3-S4;
* 22.2 version
22.2R2
and later versions earlier than 22.2R3-S2;
* 22.3 version
22.3R2
and later versions earlier than 22.3R3-S1;
* 22.4 versions earlier than 22.4R2-S2, 22.4R3;
* 23.2 versions earlier than 23.2R1-S1, 23.2R2.
This issue does not affect Juniper Networks Junos OS 21.4R1 and later versions of 21.4.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Juniper
Juniper junos Juniper srx300 Juniper srx320 Juniper srx340 Juniper srx345 Juniper srx380 |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:* |
|
Vendors & Products |
Juniper
Juniper junos Juniper srx300 Juniper srx320 Juniper srx340 Juniper srx345 Juniper srx380 |

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-08-09T20:09:26.830Z
Reserved: 2023-12-27T19:38:25.707Z
Link: CVE-2024-21605

Updated: 2024-08-01T22:27:35.771Z

Status : Analyzed
Published: 2024-04-12T15:15:23.577
Modified: 2025-02-06T16:58:10.283
Link: CVE-2024-21605

No data.