6.5

CVE-2024-21603

An Improper Check for Unusual or Exceptional Conditions vulnerability in the kernel of Juniper Network Junos OS on MX Series allows a network based attacker with low privileges to cause a denial of service.

If a scaled configuration for Source class usage (SCU) / destination class usage (DCU) (more than 10 route classes) is present and the SCU/DCU statistics are gathered by executing specific SNMP requests or CLI commands, a 'vmcore' for the RE kernel will be seen which leads to a device restart. Continued exploitation of this issue will lead to a sustained DoS.

This issue only affects MX Series devices with MPC10, MPC11 or LC9600, and MX304. No other MX Series devices are affected.

This issue affects Juniper Networks Junos OS:



  *  All versions earlier than 20.4R3-S9;
  *  21.2 versions earlier than 21.2R3-S6;
  *  21.3 versions earlier than 21.3R3-S5;
  *  21.4 versions earlier than 21.4R3;
  *  22.1 versions earlier than 22.1R3;
  *  22.2 versions earlier than 22.2R2;
  *  22.3 versions earlier than 22.3R2.






Daten sind bereitgestellt durch National Vulnerability Database (NVD)
JuniperJunos Version20.4 Update-
JuniperJunos Version20.4 Updater1
JuniperJunos Version20.4 Updater1-s1
JuniperJunos Version20.4 Updater2
JuniperJunos Version20.4 Updater2-s1
JuniperJunos Version20.4 Updater2-s2
JuniperJunos Version20.4 Updater3
JuniperJunos Version20.4 Updater3-s1
JuniperJunos Version20.4 Updater3-s2
JuniperJunos Version20.4 Updater3-s3
JuniperJunos Version20.4 Updater3-s4
JuniperJunos Version20.4 Updater3-s5
JuniperJunos Version20.4 Updater3-s6
JuniperJunos Version20.4 Updater3-s7
JuniperJunos Version20.4 Updater3-s8
JuniperJunos Version21.2 Update-
JuniperJunos Version21.2 Updater1
JuniperJunos Version21.2 Updater1-s1
JuniperJunos Version21.2 Updater1-s2
JuniperJunos Version21.2 Updater2
JuniperJunos Version21.2 Updater2-s1
JuniperJunos Version21.2 Updater2-s2
JuniperJunos Version21.2 Updater3
JuniperJunos Version21.2 Updater3-s1
JuniperJunos Version21.2 Updater3-s2
JuniperJunos Version21.2 Updater3-s3
JuniperJunos Version21.2 Updater3-s4
JuniperJunos Version21.2 Updater3-s5
JuniperJunos Version21.3 Update-
JuniperJunos Version21.3 Updater1
JuniperJunos Version21.3 Updater1-s1
JuniperJunos Version21.3 Updater1-s2
JuniperJunos Version21.3 Updater2
JuniperJunos Version21.3 Updater2-s1
JuniperJunos Version21.3 Updater2-s2
JuniperJunos Version21.3 Updater3
JuniperJunos Version21.3 Updater3-s1
JuniperJunos Version21.3 Updater3-s2
JuniperJunos Version21.3 Updater3-s3
JuniperJunos Version21.3 Updater3-s4
JuniperJunos Version21.4 Update-
JuniperJunos Version21.4 Updater1
JuniperJunos Version21.4 Updater1-s1
JuniperJunos Version21.4 Updater1-s2
JuniperJunos Version21.4 Updater2
JuniperJunos Version21.4 Updater2-s1
JuniperJunos Version21.4 Updater2-s2
JuniperJunos Version22.1 Update-
JuniperJunos Version22.1 Updater1
JuniperJunos Version22.1 Updater1-s1
JuniperJunos Version22.1 Updater1-s2
JuniperJunos Version22.1 Updater2
JuniperJunos Version22.1 Updater2-s1
JuniperJunos Version22.1 Updater2-s2
JuniperJunos Version22.2 Update-
JuniperJunos Version22.2 Updater1
JuniperJunos Version22.2 Updater1-s1
JuniperJunos Version22.2 Updater1-s2
JuniperJunos Version22.3 Update-
JuniperJunos Version22.3 Updater1
JuniperJunos Version22.3 Updater1-s1
JuniperJunos Version22.3 Updater1-s2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.227
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
sirt@juniper.net 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-754 Improper Check for Unusual or Exceptional Conditions

The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.