An Incorrect Behavior Order vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows an unauthenticated, network-based attacker to cause an integrity impact to networks downstream of the vulnerable device. When an output firewall filter is applied to an interface it doesn't recognize matching packets but permits any traffic. This issue affects Junos OS 21.4 releases from 21.4R1 earlier than 21.4R3-S6. This issue does not affect Junos OS releases earlier than 21.4R1.
History

Thu, 06 Feb 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Juniper
Juniper ex4300
Juniper ex4300-24p
Juniper ex4300-24p-s
Juniper ex4300-24t
Juniper ex4300-24t-s
Juniper ex4300-32f
Juniper ex4300-32f-dc
Juniper ex4300-32f-s
Juniper ex4300-48mp
Juniper ex4300-48mp-s
Juniper ex4300-48p
Juniper ex4300-48p-s
Juniper ex4300-48t
Juniper ex4300-48t-afi
Juniper ex4300-48t-dc
Juniper ex4300-48t-dc-afi
Juniper ex4300-48t-s
Juniper junos
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*
Vendors & Products Juniper
Juniper ex4300
Juniper ex4300-24p
Juniper ex4300-24p-s
Juniper ex4300-24t
Juniper ex4300-24t-s
Juniper ex4300-32f
Juniper ex4300-32f-dc
Juniper ex4300-32f-s
Juniper ex4300-48mp
Juniper ex4300-48mp-s
Juniper ex4300-48p
Juniper ex4300-48p-s
Juniper ex4300-48t
Juniper ex4300-48t-afi
Juniper ex4300-48t-dc
Juniper ex4300-48t-dc-afi
Juniper ex4300-48t-s
Juniper junos

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-08-02T01:32:07.280Z

Reserved: 2024-03-26T23:06:17.994Z

Link: CVE-2024-30389

cve-icon Vulnrichment

Updated: 2024-08-02T01:32:07.280Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-12T16:15:38.317

Modified: 2025-02-06T20:36:23.717

Link: CVE-2024-30389

cve-icon Redhat

No data.