An Incorrect Behavior Order vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows an unauthenticated, network-based attacker to cause an integrity impact to networks downstream of the vulnerable device.
When an output firewall filter is applied to an interface it doesn't recognize matching packets but permits any traffic.
This issue affects Junos OS 21.4 releases from 21.4R1 earlier than 21.4R3-S6.
This issue does not affect Junos OS releases earlier than 21.4R1.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Juniper
Juniper ex4300 Juniper ex4300-24p Juniper ex4300-24p-s Juniper ex4300-24t Juniper ex4300-24t-s Juniper ex4300-32f Juniper ex4300-32f-dc Juniper ex4300-32f-s Juniper ex4300-48mp Juniper ex4300-48mp-s Juniper ex4300-48p Juniper ex4300-48p-s Juniper ex4300-48t Juniper ex4300-48t-afi Juniper ex4300-48t-dc Juniper ex4300-48t-dc-afi Juniper ex4300-48t-s Juniper junos |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:* |
|
Vendors & Products |
Juniper
Juniper ex4300 Juniper ex4300-24p Juniper ex4300-24p-s Juniper ex4300-24t Juniper ex4300-24t-s Juniper ex4300-32f Juniper ex4300-32f-dc Juniper ex4300-32f-s Juniper ex4300-48mp Juniper ex4300-48mp-s Juniper ex4300-48p Juniper ex4300-48p-s Juniper ex4300-48t Juniper ex4300-48t-afi Juniper ex4300-48t-dc Juniper ex4300-48t-dc-afi Juniper ex4300-48t-s Juniper junos |

Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-08-02T01:32:07.280Z
Reserved: 2024-03-26T23:06:17.994Z
Link: CVE-2024-30389

Updated: 2024-08-02T01:32:07.280Z

Status : Analyzed
Published: 2024-04-12T16:15:38.317
Modified: 2025-02-06T20:36:23.717
Link: CVE-2024-30389

No data.