跳转到帖子

Juniper Junos OS: 2024-04 Security Bulletin: Junos OS: SRX 300 Series: Specific link local traffic causes a control plane overload (JSA75746) (CVE-2024-21605)

recommended_posts

发布于
  • Members

Juniper Junos OS: 2024-04 Security Bulletin: Junos OS: SRX 300 Series: Specific link local traffic causes a control plane overload (JSA75746) (CVE-2024-21605)

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:C)
Published
04/10/2024
Created
04/11/2024
Added
04/11/2024
Modified
01/28/2025

Description

An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). Specific valid link-local traffic is not blocked on ports in STP blocked state but is instead sent to the control plane of the device. This leads to excessive resource consumption and in turn severe impact on all control and management protocols of the device. This issue affects Juniper Networks Junos OS: *21.2 version 21.2R3-S3 and later versions earlier than 21.2R3-S6; *22.1 version 22.1R3 and later versions earlier than 22.1R3-S4; *22.2 version 22.2R2 and later versions earlier than 22.2R3-S2; *22.3 version 22.3R2 and later versions earlier than 22.3R3-S1; *22.4 versions earlier than 22.4R2-S2, 22.4R3; *23.2 versions earlier than 23.2R1-S1, 23.2R2. This issue does not affect Juniper Networks Junos OS 21.4R1 and later versions of 21.4.

Solution(s)

  • juniper-junos-os-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-21605
  • CVE - 2024-21605
  • JSA75746
  • 查看数 705
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…