7.1
CVE-2024-39541
- EPSS 0.15%
- Veröffentlicht 11.07.2024 17:15:13
- Zuletzt bearbeitet 23.01.2026 19:24:10
- Quelle sirt@juniper.net
- CVE-Watchlists
- Unerledigt
An Improper Handling of Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). When conflicting information (IP or ISO addresses) about a node is added to the Traffic Engineering (TE) database and then a subsequent operation attempts to process these, rpd will crash and restart. This issue affects: Junos OS: * 22.4 versions before 22.4R3-S1, * 23.2 versions before 23.2R2, * 23.4 versions before 23.4R1-S1, 23.4R2, This issue does not affect Junos OS versions earlier than 22.4R1. Junos OS Evolved: * 22.4-EVO versions before 22.4R3-S2-EVO, * 23.2-EVO versions before 23.2R2-EVO, * 23.4-EVO versions before 23.4R1-S1-EVO, 23.4R2-EVO, This issue does not affect Junos OS Evolved versions earlier than before 22.4R1.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Juniper ≫ Junos Os Evolved Version22.4 Update-
Juniper ≫ Junos Os Evolved Version22.4 Updater1
Juniper ≫ Junos Os Evolved Version22.4 Updater1-s1
Juniper ≫ Junos Os Evolved Version22.4 Updater1-s2
Juniper ≫ Junos Os Evolved Version22.4 Updater2
Juniper ≫ Junos Os Evolved Version22.4 Updater2-s1
Juniper ≫ Junos Os Evolved Version22.4 Updater2-s2
Juniper ≫ Junos Os Evolved Version22.4 Updater3
Juniper ≫ Junos Os Evolved Version22.4 Updater3-s1
Juniper ≫ Junos Os Evolved Version23.2 Update-
Juniper ≫ Junos Os Evolved Version23.2 Updater1
Juniper ≫ Junos Os Evolved Version23.2 Updater1-s1
Juniper ≫ Junos Os Evolved Version23.2 Updater1-s2
Juniper ≫ Junos Os Evolved Version23.4 Update-
Juniper ≫ Junos Os Evolved Version23.4 Updater1
Juniper ≫ Junos Os Evolved Version23.4 Updater2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.359 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| sirt@juniper.net | 7.1 | 0 | 0 |
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
| sirt@juniper.net | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-755 Improper Handling of Exceptional Conditions
The product does not handle or incorrectly handles an exceptional condition.