5.9

CVE-2024-21601

A Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in the Flow-processing Daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (Dos).

On SRX Series devices when two different threads try to simultaneously process a queue which is used for TCP events flowd will crash. One of these threads can not be triggered externally, so the exploitation of this race condition is outside the attackers direct control.

Continued exploitation of this issue will lead to a sustained DoS.

This issue affects Juniper Networks Junos OS:



  *  21.2 versions earlier than 21.2R3-S5;
  *  21.3 versions earlier than 21.3R3-S5;
  *  21.4 versions earlier than 21.4R3-S4;
  *  22.1 versions earlier than 22.1R3-S3;
  *  22.2 versions earlier than 22.2R3-S1;
  *  22.3 versions earlier than 22.3R2-S2, 22.3R3;
  *  22.4 versions earlier than 22.4R2-S1, 22.4R3.




This issue does not affect Juniper Networks Junos OS versions earlier than 21.2R1.



Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version21.2 Update-
JuniperJunos Version21.2 Updater1
JuniperJunos Version21.2 Updater1-s1
JuniperJunos Version21.2 Updater1-s2
JuniperJunos Version21.2 Updater2
JuniperJunos Version21.2 Updater2-s1
JuniperJunos Version21.2 Updater2-s2
JuniperJunos Version21.2 Updater3
JuniperJunos Version21.2 Updater3-s1
JuniperJunos Version21.2 Updater3-s2
JuniperJunos Version21.2 Updater3-s3
JuniperJunos Version21.2 Updater3-s4
JuniperJunos Version21.3 Update-
JuniperJunos Version21.3 Updater1
JuniperJunos Version21.3 Updater1-s1
JuniperJunos Version21.3 Updater1-s2
JuniperJunos Version21.3 Updater2
JuniperJunos Version21.3 Updater2-s1
JuniperJunos Version21.3 Updater2-s2
JuniperJunos Version21.3 Updater3
JuniperJunos Version21.3 Updater3-s1
JuniperJunos Version21.3 Updater3-s2
JuniperJunos Version21.3 Updater3-s3
JuniperJunos Version21.3 Updater3-s4
JuniperJunos Version21.4 Update-
JuniperJunos Version21.4 Updater1
JuniperJunos Version21.4 Updater1-s1
JuniperJunos Version21.4 Updater1-s2
JuniperJunos Version21.4 Updater2
JuniperJunos Version21.4 Updater2-s1
JuniperJunos Version21.4 Updater2-s2
JuniperJunos Version21.4 Updater3
JuniperJunos Version21.4 Updater3-s1
JuniperJunos Version21.4 Updater3-s2
JuniperJunos Version21.4 Updater3-s3
JuniperJunos Version22.1 Update-
JuniperJunos Version22.1 Updater1
JuniperJunos Version22.1 Updater1-s1
JuniperJunos Version22.1 Updater1-s2
JuniperJunos Version22.1 Updater2
JuniperJunos Version22.1 Updater2-s1
JuniperJunos Version22.1 Updater2-s2
JuniperJunos Version22.1 Updater3
JuniperJunos Version22.1 Updater3-s1
JuniperJunos Version22.1 Updater3-s2
JuniperJunos Version22.2 Update-
JuniperJunos Version22.2 Updater1
JuniperJunos Version22.2 Updater1-s1
JuniperJunos Version22.2 Updater1-s2
JuniperJunos Version22.2 Updater2
JuniperJunos Version22.2 Updater2-s1
JuniperJunos Version22.2 Updater2-s2
JuniperJunos Version22.2 Updater3
JuniperJunos Version22.3 Update-
JuniperJunos Version22.3 Updater1
JuniperJunos Version22.3 Updater1-s1
JuniperJunos Version22.3 Updater1-s2
JuniperJunos Version22.3 Updater2
JuniperJunos Version22.3 Updater2-s1
JuniperJunos Version22.4 Update-
JuniperJunos Version22.4 Updater1
JuniperJunos Version22.4 Updater1-s1
JuniperJunos Version22.4 Updater1-s2
JuniperJunos Version22.4 Updater2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.23% 0.461
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
sirt@juniper.net 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.