7.1

CVE-2024-21605

An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).



Specific valid link-local traffic is not blocked on ports in STP blocked state but is instead sent to the control plane of the device. This leads to excessive resource consumption and in turn severe impact on all control and management protocols of the device.



This issue affects Juniper Networks Junos OS:
  *  21.2 version 21.2R3-S3 and later versions earlier than 21.2R3-S6;
  *  22.1 version 22.1R3 and later versions earlier than 22.1R3-S4;
  *  22.2 version 

22.2R2

and later versions earlier than 22.2R3-S2;
  *  22.3 version 

22.3R2 

and later versions earlier than 22.3R3-S1;

  *  22.4 versions earlier than 22.4R2-S2, 22.4R3;
  *  23.2 versions earlier than 23.2R1-S1, 23.2R2.




This issue does not affect Juniper Networks Junos OS 21.4R1 and later versions of 21.4.

Data is provided by the National Vulnerability Database (NVD)
JuniperJunos Version21.2 Updater3-s3
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version21.2 Updater3-s4
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version21.2 Updater3-s5
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.1 Updater3
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.1 Updater3-s1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.1 Updater3-s2
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.1 Updater3-s3
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.2 Updater2
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.2 Updater2-s1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.2 Updater2-s2
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.2 Updater3
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.2 Updater3-s1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.3 Updater2
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.3 Updater2-s1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.3 Updater2-s2
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.3 Updater3
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.4 Update-
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.4 Updater1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.4 Updater1-s1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.4 Updater1-s2
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.4 Updater2
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version22.4 Updater2-s1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version23.2 Update-
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
JuniperJunos Version23.2 Updater1
   JuniperSrx300 Version-
   JuniperSrx320 Version-
   JuniperSrx340 Version-
   JuniperSrx345 Version-
   JuniperSrx380 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.189
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
sirt@juniper.net 7.1 0 0
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
sirt@juniper.net 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-668 Exposure of Resource to Wrong Sphere

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.