From c0264cac918dc852fe4a7237f0b1e4a69ffa4189 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 12 Apr 2024 16:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2013/4xxx/CVE-2013-4407.json | 7 +- 2024/28xxx/CVE-2024-28878.json | 99 +++++++++++++- 2024/30xxx/CVE-2024-30210.json | 99 +++++++++++++- 2024/30xxx/CVE-2024-30382.json | 195 +++++++++++++++++++++++++++- 2024/30xxx/CVE-2024-30384.json | 145 ++++++++++++++++++++- 2024/30xxx/CVE-2024-30386.json | 230 ++++++++++++++++++++++++++++++++- 2024/30xxx/CVE-2024-30387.json | 170 +++++++++++++++++++++++- 2024/30xxx/CVE-2024-30388.json | 171 +++++++++++++++++++++++- 2024/30xxx/CVE-2024-30389.json | 155 +++++++++++++++++++++- 2024/30xxx/CVE-2024-30390.json | 163 ++++++++++++++++++++++- 2024/30xxx/CVE-2024-30391.json | 155 +++++++++++++++++++++- 2024/30xxx/CVE-2024-30392.json | 171 +++++++++++++++++++++++- 2024/30xxx/CVE-2024-30394.json | 208 ++++++++++++++++++++++++++++- 2024/30xxx/CVE-2024-30395.json | 218 ++++++++++++++++++++++++++++++- 2024/30xxx/CVE-2024-30397.json | 183 +++++++++++++++++++++++++- 2024/30xxx/CVE-2024-30398.json | 157 +++++++++++++++++++++- 2024/30xxx/CVE-2024-30401.json | 172 +++++++++++++++++++++++- 2024/30xxx/CVE-2024-30402.json | 207 ++++++++++++++++++++++++++++- 2024/30xxx/CVE-2024-30403.json | 135 ++++++++++++++++++- 2024/30xxx/CVE-2024-30405.json | 170 +++++++++++++++++++++++- 2024/30xxx/CVE-2024-30406.json | 143 +++++++++++++++++++- 2024/30xxx/CVE-2024-30407.json | 137 +++++++++++++++++++- 2024/30xxx/CVE-2024-30409.json | 153 +++++++++++++++++++++- 2024/30xxx/CVE-2024-30410.json | 143 +++++++++++++++++++- 2024/31xxx/CVE-2024-31069.json | 99 +++++++++++++- 2024/31xxx/CVE-2024-31391.json | 72 ++++++++++- 2024/3xxx/CVE-2024-3691.json | 100 +++++++++++++- 2024/3xxx/CVE-2024-3695.json | 100 +++++++++++++- 2024/3xxx/CVE-2024-3696.json | 100 +++++++++++++- 2024/3xxx/CVE-2024-3710.json | 18 +++ 2024/3xxx/CVE-2024-3711.json | 18 +++ 2024/3xxx/CVE-2024-3712.json | 18 +++ 2024/3xxx/CVE-2024-3713.json | 18 +++ 33 files changed, 4215 insertions(+), 114 deletions(-) create mode 100644 2024/3xxx/CVE-2024-3710.json create mode 100644 2024/3xxx/CVE-2024-3711.json create mode 100644 2024/3xxx/CVE-2024-3712.json create mode 100644 2024/3xxx/CVE-2024-3713.json diff --git a/2013/4xxx/CVE-2013-4407.json b/2013/4xxx/CVE-2013-4407.json index 1e1f416395f..4edb78ed045 100644 --- a/2013/4xxx/CVE-2013-4407.json +++ b/2013/4xxx/CVE-2013-4407.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "HTTP::Body::Multipart in the HTTP-Body 1.08, 1.17, and earlier module for Perl uses the part of the uploaded file's name after the first \".\" character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed." + "value": "HTTP::Body::Multipart in the HTTP-Body module for Perl (1.07 through 1.22, before 1.23) uses the part of the uploaded file's name after the first \".\" character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed." } ] }, @@ -73,6 +73,11 @@ "refsource": "MISC", "name": "https://metacpan.org/release/GETTY/HTTP-Body-1.23/" }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/04/07/1", + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2024/04/07/1" + }, { "url": "http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/HTTP-Body.git;a=commit;h=13ac5b23c083bc56e32dd706ca02fca292bd2161", "refsource": "MISC", diff --git a/2024/28xxx/CVE-2024-28878.json b/2024/28xxx/CVE-2024-28878.json index e5586ce21c5..09d8c07470e 100644 --- a/2024/28xxx/CVE-2024-28878.json +++ b/2024/28xxx/CVE-2024-28878.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-28878", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "\nIO-1020 Micro ELD downloads source code or an executable from an \nadjacent location and executes the code without sufficiently verifying \nthe origin or integrity of the code.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-494 Download of Code Without Integrity Check", + "cweId": "CWE-494" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IOSiX", + "product": { + "product_data": [ + { + "product_name": "IO-1020 Micro ELD", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "360" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "ICSA-24-093-01", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "\n

IOSIX recommends users update to 360.

\n

For further support, contact IOSiX.\n\n

" + } + ], + "value": "IOSIX recommends users update to 360.\n\nFor further support, contact IOSiX https://www2.iosix.com/support-2/ .\n\n" + } + ], + "credits": [ + { + "lang": "en", + "value": "Jake Jepson of Colorado State University reported these vulnerabilities to CISA." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30210.json b/2024/30xxx/CVE-2024-30210.json index a9993883297..282af3b19f9 100644 --- a/2024/30xxx/CVE-2024-30210.json +++ b/2024/30xxx/CVE-2024-30210.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30210", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IO-1020 Micro ELD uses a default WIFI password that could allow an adjacent attacker to connect to the device.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1392 ", + "cweId": "CWE-1392" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IOSiX", + "product": { + "product_data": [ + { + "product_name": "IO-1020 Micro ELD", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "360" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "ICSA-24-093-01", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "\n

IOSIX recommends users update to 360.

\n

For further support, contact IOSiX.\n\n

" + } + ], + "value": "IOSIX recommends users update to 360.\n\nFor further support, contact IOSiX https://www2.iosix.com/support-2/ .\n\n" + } + ], + "credits": [ + { + "lang": "en", + "value": "Jake Jepson of Colorado State University reported these vulnerabilities to CISA." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30382.json b/2024/30xxx/CVE-2024-30382.json index 9c14b7ac0d7..47a9281b2e0 100644 --- a/2024/30xxx/CVE-2024-30382.json +++ b/2024/30xxx/CVE-2024-30382.json @@ -1,17 +1,204 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30382", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based, unauthenticated attacker to send a specific routing update, causing an rpd core due to memory corruption, leading to a Denial of Service (DoS).\n\nThis issue can only be triggered when the system is configured for CoS-based forwarding (CBF) with a policy map containing a cos-next-hop-map action (see below).\nThis issue affects:\nJunos OS: \n\n\n * all versions before 20.4R3-S10, \n * from 21.2 before 21.2R3-S8,\n * from 21.3 before 21.3R3, \n * from 21.4 before 21.4R3, \n * from 22.1 before 22.1R2;\n\n\n\n\nJunos OS Evolved: \n\n\n * all versions before 21.2R3-S8-EVO,\n * from 21.3 before 21.3R3-EVO, \n * from 21.4 before 21.4R3-EVO, \n * from 22.1 before 22.1R2-EVO.\n\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-755 Improper Handling of Exceptional Conditions", + "cweId": "CWE-755" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S10" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S8" + }, + { + "version_affected": "<", + "version_name": "21.3", + "version_value": "21.3R3" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R2" + } + ] + } + }, + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.2R3-S8-EVO" + }, + { + "version_affected": "<", + "version_name": "21.3", + "version_value": "21.3R3-EVO" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-EVO" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79174", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79174" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79174", + "defect": [ + "1640813" + ], + "discovery": "INTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following is an example of CoS-based forwarding configuration:

[edit policy-options]
set policy-statement my-cos-forwarding term 1 from route-filter destination-prefix match-type
set policy-statement my-cos-forwarding term 1 then cos-next-hop-map map-name
" + } + ], + "value": "The following is an example of CoS-based forwarding configuration:\n\n[edit policy-options]\nset policy-statement my-cos-forwarding term 1 from route-filter destination-prefix match-type\nset policy-statement my-cos-forwarding term 1 then cos-next-hop-map map-name" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue:
Junos OS: 20.4R3-S10, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.\n
Junos OS Evolved:  21.3R3-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases.\n\n" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: \nJunos OS: 20.4R3-S10, 21.3R3, 21.4R3, 22.1R2, 22.2R1, and all subsequent releases.\n\nJunos OS Evolved:\u00a0\u00a021.3R3-EVO, 21.4R3-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30384.json b/2024/30xxx/CVE-2024-30384.json index 1d2b2b2c3ab..6112e14fa1a 100644 --- a/2024/30xxx/CVE-2024-30384.json +++ b/2024/30xxx/CVE-2024-30384.json @@ -1,17 +1,154 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30384", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows a locally authenticated attacker with low privileges to cause a\u00a0Denial-of-Service (Dos).\n\nIf a specific CLI\u00a0command is issued, a\u00a0PFE crash will occur. This will cause traffic forwarding to be interrupted until the system self-recovers.\u00a0\n\nThis issue affects Junos OS:\u00a0\n\nAll versions before 20.4R3-S10,\n\n21.2 versions before 21.2R3-S7,\n\n21.4 versions before 21.4R3-S6.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754 Improper Check for Unusual or Exceptional Conditions", + "cweId": "CWE-754" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial-of-Service (Dos)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S10" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "http://supportportal.juniper.net/JSA79186", + "refsource": "MISC", + "name": "http://supportportal.juniper.net/JSA79186" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79186", + "defect": [ + "1774634" + ], + "discovery": "USER" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S10, 21.2R3-S7, 21.4R3-S6, and all subsequent releases of these branches.\n" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S10, 21.2R3-S7, 21.4R3-S6, and all subsequent releases of these branches.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30386.json b/2024/30xxx/CVE-2024-30386.json index c395eca07ea..e9e7c1fadb4 100644 --- a/2024/30xxx/CVE-2024-30386.json +++ b/2024/30xxx/CVE-2024-30386.json @@ -1,17 +1,239 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30386", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Use-After-Free vulnerability in the\u00a0Layer 2 Address Learning Daemon (l2ald)\n\n of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause l2ald to crash leading to a Denial-of-Service (DoS).\n\nIn an EVPN-VXLAN scenario,\u00a0when \n\nstate updates are received and processed by the affected system, the correct order of some processing steps is not ensured, which can lead to an l2ald crash and restart. Whether the crash occurs depends on system internal timing which is outside the attackers control.\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 20.4R3-S8,\n * 21.2 versions before 21.2R3-S6,\n * 21.3 versions before 21.3R3-S5,\n * 21.4 versions before 21.4R3-S4,\n * 22.1 versions before 22.1R3-S3,\n * 22.2 versions before 22.2R3-S1,\n * 22.3 versions before 22.3R3,,\n * 22.4 versions before 22.4R2;\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 20.4R3-S8-EVO,\n * 21.2-EVO versions before 21.2R3-S6-EVO,\u00a0\n * 21.3-EVO\n\n versions before 21.3R3-S5-EVO,\n * 21.4-EVO\n\n versions before 21.4R3-S4-EVO,\n * 22.1-EVO\n\n versions before 22.1R3-S3-EVO,\n * 22.2-EVO\n\n versions before 22.2R3-S1-EVO,\n * 22.3-EVO\n\n versions before 22.3R3-EVO,\n * 22.4-EVO\n\n versions before 22.4R2-EVO.\n\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-416 Use After Free", + "cweId": "CWE-416" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial-of-Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S8" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S6" + }, + { + "version_affected": "<", + "version_name": "21.3", + "version_value": "21.3R3-S5" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S4" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S1" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R3" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R2" + } + ] + } + }, + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S8-EVO" + }, + { + "version_affected": "<", + "version_name": "21.2-EVO", + "version_value": "21.2R3-S6-EVO" + }, + { + "version_affected": "<", + "version_name": "21.3-EVO", + "version_value": "21.3R3-S5-EVO" + }, + { + "version_affected": "<", + "version_name": "21.4-EVO", + "version_value": "21.4R3-S4-EVO" + }, + { + "version_affected": "<", + "version_name": "22.1-EVO", + "version_value": "22.1R3-S3-EVO" + }, + { + "version_affected": "<", + "version_name": "22.2-EVO", + "version_value": "22.2R3-S1-EVO" + }, + { + "version_affected": "<", + "version_name": "22.3-EVO", + "version_value": "22.3R3-EVO" + }, + { + "version_affected": "<", + "version_name": "22.4-EVO", + "version_value": "22.4R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "http://supportportal.juniper.net/JSA79184", + "refsource": "MISC", + "name": "http://supportportal.juniper.net/JSA79184" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79184", + "defect": [ + "1700170" + ], + "discovery": "INTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "\n\nTo be exposed to this issue the device must be configured for EVPN-VXLAN. Refer to product documentation for how to configure EVPN-VXLAN as there are different configuration options.\n\n" + } + ], + "value": "\nTo be exposed to this issue the device must be configured for EVPN-VXLAN. Refer to product documentation for how to configure EVPN-VXLAN as there are different configuration options.\n\n" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue:
Junos OS: 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R3, 22.3R3-S2, 22.4R2, 23.2R1, and all subsequent releases;
\n\nJunos OS Evolved: 20.4R3-S8-EVO, 21.2R3-S6-EVO, 21.3R3-S5-EVO, 21.4R3-S4-EVO, 22.1R3-S3-EVO, 22.2R3-S1-EVO, 22.3R3-EVO, 22.4R2-EVO, 23.2R1-EVO, and all subsequent releases.
" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\nJunos OS: 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R3, 22.3R3-S2, 22.4R2, 23.2R1, and all subsequent releases;\n\n\nJunos OS Evolved: 20.4R3-S8-EVO, 21.2R3-S6-EVO, 21.3R3-S5-EVO, 21.4R3-S4-EVO, 22.1R3-S3-EVO, 22.2R3-S1-EVO, 22.3R3-EVO, 22.4R2-EVO, 23.2R1-EVO, and all subsequent releases.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30387.json b/2024/30xxx/CVE-2024-30387.json index 7f3ade163a2..9a32a9f197b 100644 --- a/2024/30xxx/CVE-2024-30387.json +++ b/2024/30xxx/CVE-2024-30387.json @@ -1,17 +1,179 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30387", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A\u00a0Missing Synchronization vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on ACX5448 and ACX710 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).\n\nIf an interface flaps while the system gathers statistics on that interface, two processes simultaneously access a shared resource which leads to a PFE crash and restart.\n\nThis issue affects Junos OS:\n\nAll versions before 20.4R3-S9,\n\n21.2 versions before 21.2R3-S5,\u00a0\n\n21.3 versions before 21.3R3-S5,\u00a0\n\n21.4 versions before 21.4R3-S4,\n\n22.1 versions before 22.1R3-S2,\n\n22.2 versions before 22.2R3-S2,\n\n22.3 versions before 22.3R2-S2, 22.3R3,\n\n22.4 versions before 22.4R2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-820 Missing Synchronization", + "cweId": "CWE-820" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial-of-Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S9" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S5" + }, + { + "version_affected": "<", + "version_name": "21.3", + "version_value": "21.3R3-S5" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S4" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S2" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S2" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R2-S2, 22.3R3" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R2, 22.4R3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "http://supportportal.juniper.net/JSA79187", + "refsource": "MISC", + "name": "http://supportportal.juniper.net/JSA79187" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79187", + "defect": [ + "1702544" + ], + "discovery": "USER" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2, 23.2R1, and all subsequent releases.\n" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2, 23.2R1, and all subsequent releases.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30388.json b/2024/30xxx/CVE-2024-30388.json index 3399ea60348..defcba95f35 100644 --- a/2024/30xxx/CVE-2024-30388.json +++ b/2024/30xxx/CVE-2024-30388.json @@ -1,17 +1,180 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30388", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Isolation or Compartmentalization vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on QFX5000 Series and EX Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nIf a specific malformed LACP packet is received by a QFX5000 Series, or an EX4400, EX4100 or EX4650 Series device, an LACP flap will occur resulting in traffic loss.\nThis issue affects Junos OS on QFX5000 Series, and on EX4400, EX4100 or EX4650 Series:\n\n\n\n * 20.4 versions from \n\n20.4R3-S4\n\nbefore 20.4R3-S8,\n * 21.2 versions from \n\n21.2R3-S2\n\nbefore 21.2R3-S6,\n * 21.4 versions from \n\n21.4R2\n\nbefore 21.4R3-S4,\n\n * 22.1 versions from\n\n22.1R2\n\n before 22.1R3-S3,\n * 22.2 versions before 22.2R3-S1,\n * 22.3 versions before 22.3R2-S2, 22.3R3,\n * 22.4 versions before 22.4R2-S1, 22.4R3.\n\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-653: Improper Isolation or Compartmentalization", + "cweId": "CWE-653" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "20.4R3-S4", + "version_value": "20.4R3-S8" + }, + { + "version_affected": "<", + "version_name": "21.2R3-S2", + "version_value": "21.2R3-S6" + }, + { + "version_affected": "<", + "version_name": "21.4R2", + "version_value": "21.4R3-S4" + }, + { + "version_affected": "<", + "version_name": "22.1R2", + "version_value": "22.1R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S1" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R2-S2, 22.3R3" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R2-S1, 22.4R3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "http://supportportal.juniper.net/JSA79089", + "refsource": "MISC", + "name": "http://supportportal.juniper.net/JSA79089" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79089", + "defect": [ + "1711783" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "\n\nTo be affected by this issue the device must have an LACP configuration as shown in the following example must be present:

  [ interfaces <interface> ...ether-options 802.3ad ae<number> ]
  [ interfaces ae<number> aggregated-ether-options lacp ]
" + } + ], + "value": "\nTo be affected by this issue the device must have an LACP configuration as shown in the following example must be present:\n\n\u00a0 [ interfaces ...ether-options\u00a0802.3ad ae ]\n\u00a0 [ interfaces ae aggregated-ether-options lacp ]\n" + } + ], + "work_around": [ + { + "lang": "en", + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue: 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, 23.2R1, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, 23.2R1, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30389.json b/2024/30xxx/CVE-2024-30389.json index 41316560843..237e4823cb7 100644 --- a/2024/30xxx/CVE-2024-30389.json +++ b/2024/30xxx/CVE-2024-30389.json @@ -1,17 +1,164 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30389", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Incorrect Behavior Order vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows an unauthenticated, network-based attacker to cause an integrity impact to networks downstream of the vulnerable device.\n\nWhen an output firewall filter is applied to an interface it doesn't recognize matching packets but permits any traffic.\nThis issue affects Junos OS 21.4 releases from 21.4R1 earlier than 21.4R3-S6.\nThis issue does not affect Junos OS releases earlier than 21.4R1.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-696 Incorrect Behavior Order", + "cweId": "CWE-696" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "21.4R3-S6", + "status": "affected", + "version": "21.4", + "versionType": "semver" + }, + { + "lessThan": "21.4R1", + "status": "unaffected", + "version": "21.4", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "http://supportportal.juniper.net/JSA79185", + "refsource": "MISC", + "name": "http://supportportal.juniper.net/JSA79185" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79185", + "defect": [ + "1770410" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "To be affected by this issue an output firewall filter has to be configured on a interface like in the following example:

  [ interfaces <interface> unit <unit> family <family> filter output <filter_name> ]" + } + ], + "value": "To be affected by this issue an output firewall filter has to be configured on a interface like in the following example:\n\n\u00a0 [\u00a0interfaces unit family filter output ]" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

While there is no known workarounds for this issue, it is possible to recover by deactivating and then activating the filter. But please note that the issue might reoccur after a reboot or pfe restart.

" + } + ], + "value": "While there is no known workarounds for this issue, it is possible to recover by deactivating and then activating the filter. But please note that the issue might reoccur after a reboot or pfe restart." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software release has been updated to resolve this specific issue: 21.4R3-S6, and all subsequent releases of this branch." + } + ], + "value": "The following software release has been updated to resolve this specific issue: 21.4R3-S6, and all subsequent releases of this branch." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30390.json b/2024/30xxx/CVE-2024-30390.json index 7a4ea1a98ae..286350c21b7 100644 --- a/2024/30xxx/CVE-2024-30390.json +++ b/2024/30xxx/CVE-2024-30390.json @@ -1,17 +1,172 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30390", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited\u00a0Denial of Service (DoS) to the management plane.\n\nWhen an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't consider existing connections anymore for subsequent connection attempts so that the connection\u00a0limit can be exceeded.\nThis issue affects Junos OS Evolved:\n\nAll versions before 21.4R3-S4-EVO,\n\n22.1-EVO versions before 22.1R3-S3-EVO,\n\n22.2-EVO versions before 22.2R3-S2-EVO,\u00a0\n\n22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-307 Improper Restriction of Excessive Authentication Attempts", + "cweId": "CWE-307" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial-of-Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.4R3-S4-EVO" + }, + { + "version_affected": "<", + "version_name": "22.1-EVO", + "version_value": "22.1R3-S3-EVO" + }, + { + "version_affected": "<", + "version_name": "22.2-EVO", + "version_value": "22.2R3-S2-EVO" + }, + { + "version_affected": "<", + "version_name": "22.3-EVO", + "version_value": "22.3R2-S1-EVO, 22.3R3-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "http://supportportal.juniper.net/JSA79183", + "refsource": "MISC", + "name": "http://supportportal.juniper.net/JSA79183" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79183", + "defect": [ + "1709385" + ], + "discovery": "INTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In order to be impacted by this issue the system needs to be configured with a connection-limit and a rate-limit for at least one of the following protocols / services. This can either be done explicit as shown below, but please note that these options are also in effect by default.

  [ system services ( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control | tftp-server ) connection-limit <limit> ]
  \n\n[ system services \n\n( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control \n\n| tftp-server\n\n)\n\nrate-limit <limit> ]
" + } + ], + "value": "In order to be impacted by this issue the system needs to be configured with a connection-limit and a rate-limit for at least one of the following protocols / services. This can either be done explicit as shown below, but please note that these options are also in effect by default.\n\n\u00a0 [ system services ( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control | tftp-server ) connection-limit ]\n\u00a0 \n\n[ system services \n\n( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control \n\n| tftp-server\n\n)\n\nrate-limit ]\n" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

To reduce the risk of exploitation use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts.

" + } + ], + "value": "There are no known workarounds for this issue.\nTo reduce the risk of exploitation use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue:
Junos OS Evolved: 20.4R3-S9-EVO, 21.4R3-S4-EVO, 22.1R3-S3-EVO, 22.2R3-S2-EVO, 22.3R2-S1-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases.\n" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\nJunos OS Evolved: 20.4R3-S9-EVO, 21.4R3-S4-EVO, 22.1R3-S3-EVO, 22.2R3-S2-EVO, 22.3R2-S1-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30391.json b/2024/30xxx/CVE-2024-30391.json index 4bdb5b2895c..b4ecfa5373f 100644 --- a/2024/30xxx/CVE-2024-30391.json +++ b/2024/30xxx/CVE-2024-30391.json @@ -1,17 +1,164 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30391", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Missing Authentication for Critical Function vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series with SPC3, and\u00a0SRX Series\u00a0allows an unauthenticated network-based attacker to cause limited impact to the integrity or availability of the device.\n\nIf a device is configured with IPsec authentication algorithm hmac-sha-384 or hmac-sha-512, tunnels are established normally but for traffic traversing the tunnel no authentication information is sent with the encrypted data on egress, and no authentication information is expected on ingress. So if the peer is an unaffected device transit traffic is going to fail in both directions. If the peer is an also affected device transit traffic works, but without authentication, and configuration and CLI operational commands indicate authentication is performed.\nThis issue affects Junos OS:\n\nAll versions before 20.4R3-S7,\n\n21.1 versions before 21.1R3,\u00a0\n\n21.2 versions before 21.2R2-S1, 21.2R3,\u00a0\n\n21.3 versions before 21.3R1-S2, 21.3R2.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306 Missing Authentication for Critical Function", + "cweId": "CWE-306" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.1", + "version_value": "21.1R3" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R2-S1, 21.2R3" + }, + { + "version_affected": "<", + "version_name": "21.3", + "version_value": "21.3R1-S2, 21.3R2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "http://supportportal.juniper.net/JSA79188", + "refsource": "MISC", + "name": "http://supportportal.juniper.net/JSA79188" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79188", + "defect": [ + "1557177" + ], + "discovery": "INTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "For a device to be affected IPsec must be configured with either hmac-sha-384 or hmac-sha-512 as follows:

  [ security ipsec proposal <proposal> authentication-algorithm hmac-sha-384/hmac-sha-512 ]" + } + ], + "value": "For a device to be affected IPsec must be configured with either\u00a0hmac-sha-384 or hmac-sha-512 as follows:\n\n\u00a0 [ security\u00a0ipsec\u00a0proposal authentication-algorithm hmac-sha-384/hmac-sha-512 ]" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S7, 21.1R3, 21.2R2-S1, 21.2R3, \n\n21.3R1-S2, 21.3R2, 21.4R1, and all subsequent releases.
\n\n
Please note that for releases earlier than 21.1 the affected CLI options have been removed. For releases from 21.1 onwards the issue has been fixed.
\n\n
" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S7, 21.1R3, 21.2R2-S1, 21.2R3, \n\n21.3R1-S2, 21.3R2, 21.4R1, and all subsequent releases.\n\n\n\nPlease note that for releases earlier than 21.1 the affected CLI options have been removed. For releases from 21.1 onwards the issue has been fixed.\n\n\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30392.json b/2024/30xxx/CVE-2024-30392.json index 7c24bd323ce..cfb66767407 100644 --- a/2024/30xxx/CVE-2024-30392.json +++ b/2024/30xxx/CVE-2024-30392.json @@ -1,17 +1,180 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30392", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Stack-based Buffer Overflow vulnerability in Flow Processing Daemon (flowd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).\n\nOn all Junos OS MX Series platforms with SPC3 and MS-MPC/-MIC, when URL filtering is enabled and a specific URL request is received and processed, flowd will crash and restart. Continuous reception of the specific URL request will lead to a sustained Denial of Service (DoS) condition.\n\nThis issue affects:\nJunos OS:\n\n\n\n * all versions before 21.2R3-S6,\n\n * from 21.3 before 21.3R3-S5,\n\n * from 21.4 before 21.4R3-S5,\n\n * from 22.1 before 22.1R3-S3,\n\n * from 22.2 before 22.2R3-S1,\n\n * from 22.3 before 22.3R2-S2, 22.3R3,\n\n * from 22.4 before 22.4R2-S1, 22.4R3.\n\n\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121: Stack-based Buffer Overflow", + "cweId": "CWE-121" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.2R3-S6" + }, + { + "version_affected": "<", + "version_name": "21.3", + "version_value": "21.3R3-S5" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S1" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R2-S2, 22.3R3" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R2-S1, 22.4R3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79092", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79092" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79092", + "defect": [ + "1731552" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "For the issue to occur, following two conditions need to be met:

1. Enable URL filtering:
      [jservices-urlf enable]
2. Configure the following template:
      [url-filter-template template {client-interfaces [] server-interfaces [] dns-server <IP_address> url-filter-database <db_name>}]    
" + } + ], + "value": "For the issue to occur, following two conditions need to be met:\n\n1. Enable URL filtering:\n\u00a0 \u00a0 \u00a0 [jservices-urlf enable]\n2. Configure the following template:\n\u00a0 \u00a0 \u00a0 [url-filter-template template {client-interfaces [] server-interfaces [] dns-server \u00a0url-filter-database }] \u00a0 \u00a0\n" + } + ], + "work_around": [ + { + "lang": "en", + "value": "There are no available workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue: 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, 23.2R1, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3, 23.2R1, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30394.json b/2024/30xxx/CVE-2024-30394.json index 4922e76232a..0886a834a10 100644 --- a/2024/30xxx/CVE-2024-30394.json +++ b/2024/30xxx/CVE-2024-30394.json @@ -1,17 +1,217 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30394", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A\u00a0Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) component of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an rpd crash, leading to Denial of Service (DoS).\n\nOn all Junos OS and Junos OS Evolved platforms, when EVPN is configured, and a specific EVPN type-5 route is received via BGP, rpd crashes and restarts. Continuous receipt of this specific route will lead to a sustained Denial of Service (DoS) condition.\n\nThis issue affects:\nJunos OS:\n\n\n\n * all versions before 21.2R3-S7,\n\n * from 21.4 before 21.4R3-S5,\n\n * from 22.1 before 22.1R3-S4,\n\n * from 22.2 before 22.2R3-S2,\n\n * from 22.3 before 22.3R3-S1,\n\n * from 22.4 before 22.4R3,\n\n * from 23.2 before 23.2R2.\n\n\n\n\n\nJunos OS Evolved:\n\n\n\n * all versions before 21.4R3-S5-EVO,\n\n * from 22.1-EVO before 22.1R3-S4-EVO,\n\n * from 22.2-EVO before 22.2R3-S2-EVO,\n\n * from 22.3-EVO before 22.3R3-S1-EVO,\n\n * from 22.4-EVO before 22.4R3-EVO,\n\n * from 23.2-EVO before 23.2R2-EVO.\n\n\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-121: Stack-based Buffer Overflow", + "cweId": "CWE-121" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S4" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S2" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R3-S1" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R3" + }, + { + "version_affected": "<", + "version_name": "23.2", + "version_value": "23.2R2" + } + ] + } + }, + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.4R3-S5-EVO" + }, + { + "version_affected": "<", + "version_name": "22.1-EVO", + "version_value": "22.1R3-S4-EVO" + }, + { + "version_affected": "<", + "version_name": "22.2-EVO", + "version_value": "22.2R3-S2-EVO" + }, + { + "version_affected": "<", + "version_name": "22.3-EVO", + "version_value": "22.3R3-S1-EVO" + }, + { + "version_affected": "<", + "version_name": "22.4-EVO", + "version_value": "22.4R3-EVO" + }, + { + "version_affected": "<", + "version_name": "23.2-EVO", + "version_value": "23.2R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79094", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79094" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79094", + "defect": [ + "1740634" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "For this issue to occur, EVPN needs to be enabled.
  [protocols evpn]
" + } + ], + "value": "For this issue to occur, EVPN needs to be enabled.\n\u00a0 [protocols evpn]" + } + ], + "work_around": [ + { + "lang": "en", + "value": "There are no available workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue:

Junos OS: 21.2R3-S7, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S1, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases.

Junos OS Evolved: 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S1-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\n\nJunos OS:\u00a021.2R3-S7, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S1, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases.\n\nJunos OS Evolved: 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S1-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30395.json b/2024/30xxx/CVE-2024-30395.json index 072bb3dc149..8dcfc95bacd 100644 --- a/2024/30xxx/CVE-2024-30395.json +++ b/2024/30xxx/CVE-2024-30395.json @@ -1,17 +1,227 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30395", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An\u00a0Improper Validation of Specified Type of Input vulnerability in Routing Protocol Daemon (RPD) of Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).\n\nIf a BGP update is received over an established BGP session which contains a tunnel encapsulation attribute with a specifically malformed TLV, rpd will crash and restart.\nThis issue affects:\n\nJunos OS:\n\n\n\n * all versions before 21.2R3-S7,\u00a0\n\n * from 21.3 before 21.3R3-S5,\u00a0\n\n * from 21.4 before 21.4R3-S5,\u00a0\n\n * from 22.1 before 22.1R3-S5,\u00a0\n\n * from 22.2 before 22.2R3-S3,\u00a0\n\n * from 22.3 before 22.3R3-S2,\u00a0\n\n * from 22.4 before 22.4R3,\u00a0\n\n * from 23.2 before 23.2R1-S2, 23.2R2.\n\n\n\n\n\nJunos OS Evolved:\n\n\n\n * all versions before 21.2R3-S7-EVO,\u00a0\n\n * from 21.3-EVO before 21.3R3-S5-EVO,\u00a0\n\n * from 21.4-EVO before 21.4R3-S5-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S3-EVO,\u00a0\n\n * from 22.3-EVO before 22.3R3-S2-EVO,\u00a0\n\n * from 22.4-EVO before 22.4R3-EVO,\u00a0\n\n * from 23.2-EVO before 23.2R1-S2-EVO, 23.2R2-EVO.\n\n\n\nThis is a related but separate issue than the one described in\u00a0JSA75739\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1287 Improper Validation of Specified Type of Input", + "cweId": "CWE-1287" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.3", + "version_value": "21.3R3-S5" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R3-S2" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R3" + }, + { + "version_affected": "<", + "version_name": "23.2", + "version_value": "23.2R1-S2, 23.2R2" + } + ] + } + }, + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.2R3-S7-EVO" + }, + { + "version_affected": "<", + "version_name": "21.3-EVO", + "version_value": "21.3R3-S5-EVO" + }, + { + "version_affected": "<", + "version_name": "21.4-EVO", + "version_value": "21.4R3-S5-EVO" + }, + { + "version_affected": "<", + "version_name": "22.2-EVO", + "version_value": "22.2R3-S3-EVO" + }, + { + "version_affected": "<", + "version_name": "22.3-EVO", + "version_value": "22.3R3-S2-EVO" + }, + { + "version_affected": "<", + "version_name": "22.4-EVO", + "version_value": "22.4R3-EVO" + }, + { + "version_affected": "<", + "version_name": "23.2-EVO", + "version_value": "23.2R1-S2-EVO, 23.2R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79095", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79095" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79095", + "defect": [ + "1750441" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

To be exposed to this vulnerability BGP needs to be configured as in the following example, but no further options need to be enabled:

  [protocols bgp group <group> neighbor ...]

" + } + ], + "value": "To be exposed to this vulnerability BGP needs to be configured as in the following example, but no further options need to be enabled:\n\n\u00a0 [protocols bgp group neighbor ...]\n\n" + } + ], + "work_around": [ + { + "lang": "en", + "value": "There are no available workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue:

Junos OS: 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.

Junos OS Evolved: 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.2R3-S3-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\n\nJunos OS:\u00a021.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.\n\nJunos OS Evolved: 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.2R3-S3-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30397.json b/2024/30xxx/CVE-2024-30397.json index dc73b680b68..3465c989cf8 100644 --- a/2024/30xxx/CVE-2024-30397.json +++ b/2024/30xxx/CVE-2024-30397.json @@ -1,17 +1,192 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30397", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the the\u00a0Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS).\n\nThe pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail.\n\nThis CPU utilization of pkid can be checked using this command: \n\u00a0 root@srx> show system processes extensive | match pkid\n\u00a0 xxxxx \u2003root \u2003103\u2003 0 \u2003846M \u2003136M \u2003CPU1 \u20031\u00a0569:00 100.00% pkid\n\nThis issue affects:\nJuniper Networks Junos OS\nAll\u00a0versions prior to 20.4R3-S10;\n21.2 versions prior to 21.2R3-S7;\n21.4 versions prior to 21.4R3-S5;\n22.1 versions prior to 22.1R3-S4;\n22.2 versions prior to\u00a022.2R3-S3;\n22.3 versions prior to\u00a022.3R3-S1;\n22.4 versions prior to\u00a022.4R3;\n23.2 versions prior to\u00a023.2R1-S2, 23.2R2.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754 Improper Check for Unusual or Exceptional Conditions", + "cweId": "CWE-754" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S10" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S4" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R3-S1" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R3" + }, + { + "version_affected": "<", + "version_name": "23.2", + "version_value": "23.2R1-S2, 23.2R2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79179", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79179" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79179", + "defect": [ + "1745288" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "To be affected by this issue, the following configuration is required on the device:
  [ security ike proposal <name>authentication-method rsa-signatures ]
" + } + ], + "value": "To be affected by this issue, the following configuration is required on the device:\n\u00a0 [ security ike proposal authentication-method rsa-signatures ]\n" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S10, 21.2R3-S7, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S1, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.\n" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 20.4R3-S10, 21.2R3-S7, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S1, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30398.json b/2024/30xxx/CVE-2024-30398.json index 7128a113d80..0b5bb202115 100644 --- a/2024/30xxx/CVE-2024-30398.json +++ b/2024/30xxx/CVE-2024-30398.json @@ -1,17 +1,166 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30398", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\n\nWhen a high amount of specific traffic is received on a SRX4600 device, due to an error in internal packet handling, a consistent rise in CPU memory utilization occurs. This results in packet drops in the traffic and eventually the PFE crashes. A manual reboot of the PFE will be required to restore the device to original state.\n\nThis issue affects Junos OS:\u00a0\u00a0\n21.2 before\u00a021.2R3-S7,\n21.4 before 21.4R3-S6,\u00a0\n22.1 before 22.1R3-S5, \n22.2 before 22.2R3-S3,\n22.3 before 22.3R3-S2,\n22.4 before 22.4R3,\n23.2 before\u00a023.2R1-S2, 23.2R2.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", + "cweId": "CWE-119" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S6" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R3-S2" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R3" + }, + { + "version_affected": "<", + "version_name": "23.2", + "version_value": "23.2R1-S2, 23.2R2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79176", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79176" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79176", + "defect": [ + "1746567" + ], + "discovery": "USER" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue: 21.2R3-S7, 21.4R3-S622.1R3-S522.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R223.4R1, and all subsequent releases.\n" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 21.2R3-S7,\u00a021.4R3-S6,\u00a022.1R3-S5,\u00a022.2R3-S3,\u00a022.3R3-S2,\u00a022.4R3,\u00a023.2R1-S2, 23.2R2,\u00a023.4R1, and all subsequent releases.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30401.json b/2024/30xxx/CVE-2024-30401.json index 96bba0a276a..78574027799 100644 --- a/2024/30xxx/CVE-2024-30401.json +++ b/2024/30xxx/CVE-2024-30401.json @@ -1,17 +1,181 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30401", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buffer overflow, leading to a reboot of the FPC.\n\nThrough code review, it was determined that the interface definition code for aftman could read beyond a buffer boundary, leading to a stack-based buffer overflow.\nThis issue affects Junos OS on MX Series and EX9200-15C:\n\n\n * from 21.2 before 21.2R3-S1, \n * from 21.4 before 21.4R3, \n * from 22.1 before 22.1R2, \n * from 22.2 before 22.2R2;\u00a0\n\n\n\n\nThis issue does not affect:\n\n\n\n * versions of Junos OS prior to\u00a020.3R1;\n * any version of Junos OS 20.4.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-125 Out-of-bounds Read", + "cweId": "CWE-125" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "21.2R3-S1", + "status": "affected", + "version": "21.2", + "versionType": "semver" + }, + { + "lessThan": "21.4R3", + "status": "affected", + "version": "21.4", + "versionType": "semver" + }, + { + "lessThan": "22.1R2", + "status": "affected", + "version": "22.1", + "versionType": "semver" + }, + { + "lessThan": "22.2R2", + "status": "affected", + "version": "22.2", + "versionType": "semver" + }, + { + "lessThan": "20.3R1", + "status": "unaffected", + "version": "0", + "versionType": "semver" + }, + { + "status": "unaffected", + "version": "20.4" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79110", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79110" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79110", + "defect": [ + "1670609" + ], + "discovery": "INTERNAL" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue:

Junos OS: 21.2R3-S1, 21.4R3, 22.1R2, 22.2R2, 22.3R1, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\n\nJunos OS: 21.2R3-S1, 21.4R3, 22.1R2, 22.2R2, 22.3R1, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30402.json b/2024/30xxx/CVE-2024-30402.json index aecb32bf446..145968c7ec2 100644 --- a/2024/30xxx/CVE-2024-30402.json +++ b/2024/30xxx/CVE-2024-30402.json @@ -1,17 +1,216 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30402", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Layer 2 Address Learning Daemon\u00a0(l2ald) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nWhen telemetry requests are sent to the device,\u00a0and the Dynamic Rendering Daemon (drend) is suspended, the l2ald crashes and restarts due to factors outside the attackers control. Repeated occurrences of these events causes a sustained DoS condition.\n\n\nThis issue affects:\nJunos OS:\nAll versions earlier than\u00a020.4R3-S10;\n21.2 versions earlier than\u00a021.2R3-S7;\n21.4 versions earlier than\u00a021.4R3-S5;\n22.1 versions earlier than\u00a022.1R3-S4;\n22.2 versions earlier than\u00a022.2R3-S3;\n22.3 versions earlier than\u00a022.3R3-S1;\n22.4 versions earlier than\u00a022.4R3;\n23.2 versions earlier than\u00a023.2R1-S2, 23.2R2.\n\nJunos OS Evolved:\n\nAll versions earlier than\u00a021.4R3-S5-EVO;\n22.1-EVO versions earlier than\u00a022.1R3-S4-EVO;\n22.2-EVO versions earlier than\u00a022.2R3-S3-EVO;\n22.3-EVO versions earlier than\u00a022.3R3-S1-EVO;\n22.4-EVO versions earlier than\u00a022.4R3-EVO;\n23.2-EVO versions earlier than\u00a023.2R2-EVO.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754 Improper Check for Unusual or Exceptional Conditions", + "cweId": "CWE-754" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "20.4", + "version_value": "20.4R3-S10" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S4" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R3-S1" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R3" + }, + { + "version_affected": "<", + "version_name": "23.2", + "version_value": "23.2R1-S2, 23.2R2" + } + ] + } + }, + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "21.4-EVO", + "version_value": "21.4R3-S5-EVO" + }, + { + "version_affected": "<", + "version_name": "22.1-EVO", + "version_value": "22.1R3-S4-EVO" + }, + { + "version_affected": "<", + "version_name": "22.2-EVO", + "version_value": "22.2R3-S3-EVO" + }, + { + "version_affected": "<", + "version_name": "22.3-EVO", + "version_value": "22.3R3-S1-EVO" + }, + { + "version_affected": "<", + "version_name": "22.4-EVO", + "version_value": "22.4R3-EVO" + }, + { + "version_affected": "<", + "version_name": "23.2-EVO", + "version_value": "23.2R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79180", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79180" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79180", + "defect": [ + "1743744" + ], + "discovery": "INTERNAL" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue:
Junos OS Evolved: 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R3-S1-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.
Junos OS: 20.4R3-S10, 21.2R3-S7, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S1, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.
" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: \nJunos OS Evolved: 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S3-EVO, 22.3R3-S1-EVO, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.\nJunos OS: 20.4R3-S10, 21.2R3-S7, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S1, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30403.json b/2024/30xxx/CVE-2024-30403.json index 99ec3cc8675..1cc2ce5a040 100644 --- a/2024/30xxx/CVE-2024-30403.json +++ b/2024/30xxx/CVE-2024-30403.json @@ -1,17 +1,144 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30403", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\nWhen Layer 2 traffic is sent through a logical interface, MAC learning happens. If during this process, the interface flaps,\u00a0an\u00a0Advanced Forwarding Toolkit manager (evo-aftmand-bt) core is observed. This leads to a PFE restart. The crash reoccurs if the same sequence of events happens, which will lead to a sustained DoS condition.\n\nThis issue affects Juniper Networks Junos OS Evolved:\n23.2-EVO versions earlier than 23.2R1-S1-EVO, 23.2R2-EVO. \n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-476 NULL Pointer Dereference", + "cweId": "CWE-476" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service (DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "23.2-EVO", + "version_value": "23.2R1-S1-EVO, 23.2R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79181", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79181" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "JSA79181", + "defect": [ + "1736588" + ], + "discovery": "INTERNAL" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue.

" + } + ], + "value": "There are no known workarounds for this issue." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The following software releases have been updated to resolve this specific issue: 23.2R1-S1-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.\n" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: 23.2R1-S1-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30405.json b/2024/30xxx/CVE-2024-30405.json index cf4c6f22ad4..cd200d67a0c 100644 --- a/2024/30xxx/CVE-2024-30405.json +++ b/2024/30xxx/CVE-2024-30405.json @@ -1,17 +1,179 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30405", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Incorrect Calculation of Buffer Size vulnerability in Juniper Networks Junos OS SRX 5000 Series devices using SPC2 line cards while ALGs are enabled allows an attacker sending specific crafted packets to cause a transit traffic Denial of Service (DoS).\n\nContinued receipt and processing of these specific packets will sustain the Denial of Service condition.\n\nThis issue affects:\nJuniper Networks Junos OS SRX 5000 Series with SPC2 with ALGs enabled.\n * All versions earlier than 21.2R3-S7;\n * 21.4 versions earlier than 21.4R3-S6;\n * 22.1 versions earlier than 22.1R3-S5;\n * 22.2 versions earlier than 22.2R3-S3;\n * 22.3 versions earlier than 22.3R3-S2;\n * 22.4 versions earlier than 22.4R3;\n * 23.2 versions earlier than 23.2R2.\u00a0\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-131 Incorrect Calculation of Buffer Size", + "cweId": "CWE-131" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S6" + }, + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R3-S5" + }, + { + "version_affected": "<", + "version_name": "22.2", + "version_value": "22.2R3-S3" + }, + { + "version_affected": "<", + "version_name": "22.3", + "version_value": "22.3R3-S2" + }, + { + "version_affected": "<", + "version_name": "22.4", + "version_value": "22.4R3" + }, + { + "version_affected": "<", + "version_name": "23.2", + "version_value": "23.2R2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79105", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79105" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Green", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Green" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79105", + "defect": [ + "1750148" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following minimum configuration is required to be exposed to the issue:

  [security alg]

" + } + ], + "value": "The following minimum configuration is required to be exposed to the issue:\n\n\u00a0 [security alg]\n\n\n \n\n" + } + ], + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

There are no known workarounds for this issue other than reducing risk by disabling as many ALGs as possible until the device can be upgraded.

" + } + ], + "value": "There are no known workarounds for this issue other than reducing risk by disabling as many ALGs as possible until the device can be upgraded." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue: 21.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\u00a021.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30406.json b/2024/30xxx/CVE-2024-30406.json index d2d857d4386..c32a6adb793 100644 --- a/2024/30xxx/CVE-2024-30406.json +++ b/2024/30xxx/CVE-2024-30406.json @@ -1,17 +1,152 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30406", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved ACX Series devices\u00a0using the Paragon Active Assurance Test Agent software installed on network devices allows a local, authenticated attacker with high privileges to read all other users login credentials.\n\nThis issue affects only Juniper Networks Junos OS Evolved ACX Series devices using\u00a0the Paragon Active Assurance Test Agent software installed on these devices from 23.1R1-EVO through 23.2R2-EVO.\u00a0\n\nThis issue does not affect releases before 23.1R1-EVO.\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-313: Cleartext Storage in a File or on Disk", + "cweId": "CWE-313" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "23.1R1-EVO", + "version_value": "23.2R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79104", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79104" + }, + { + "url": "https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html", + "refsource": "MISC", + "name": "https://www.juniper.net/documentation/us/en/software/junos/junos-install-upgrade-evo/topics/topic-map/paa-test-agent-install.html" + }, + { + "url": "https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html", + "refsource": "MISC", + "name": "https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/RE:M/U:Green", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/RE:M/U:Green" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79104", + "defect": [ + "1728816" + ], + "discovery": "INTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Potentially affected devices are those which use the following configuration statement:

  <codeph>test-agent</codeph>

Located at the hierarchy level:
  
  <codeph>[edit services pas]</codeph>

Therefore verify that the following minimal configuration statement in the Junos device exists:
  [services pas]

And verify that the agent is running on the device. 

" + } + ], + "value": "Potentially affected devices are those which use the following configuration statement:\n\n\u00a0 test-agent\n\nLocated at the hierarchy level:\n\u00a0\u00a0\n\u00a0 [edit services pas]\n\nTherefore verify that the following minimal configuration statement in the Junos device exists:\n\u00a0 [services pas]\n\nAnd verify that the agent is running on the device.\u00a0\n\n" + } + ], + "work_around": [ + { + "lang": "en", + "value": "There are no known workarounds for this issue.\n\nDevices using the following deprecated operational mode command are unaffected:\n\n request services paa install\n\nSee the Junos OS Evolved Software Installation and Upgrade Guide for the Paragon Active Assurance (PAA) Test Agent installation instructions for further information." + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue:

Junos OS Evolved: 23.2R2-EVO, 23.3R1-EVO, and all subsequent releases.

Note: Before you upgrade the system software from Junos OS Evolved Release 23.2R1 to a later release, you must uninstall the test agent using the request services paa uninstall command. See the product documentation for upgrade procedures and coordinate with JTAC for support.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue: \n\nJunos OS Evolved: 23.2R2-EVO, 23.3R1-EVO, and all subsequent releases.\n\nNote: Before you upgrade the system software from Junos OS Evolved Release 23.2R1 to a later release, you must uninstall the test agent using the request services paa uninstall\u00a0command. See the product documentation for upgrade procedures and coordinate with JTAC for support.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30407.json b/2024/30xxx/CVE-2024-30407.json index 4d0e5e49709..6e561f20ac3 100644 --- a/2024/30xxx/CVE-2024-30407.json +++ b/2024/30xxx/CVE-2024-30407.json @@ -1,17 +1,146 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30407", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks\u00a0Juniper Cloud Native Router (JCNR)\u00a0and\u00a0containerized routing Protocol Deamon (cRPD) products allows an attacker to perform Person-in-the-Middle (PitM) attacks which results in complete compromise of the container. \n\nDue to hardcoded SSH host keys being present on the container, a PitM attacker can intercept SSH traffic without being detected.\u00a0\n\nThis issue affects Juniper Networks JCNR:\n * All versions before 23.4.\n\n\nThis issue affects Juniper Networks cRPD:\n * All versions before 23.4R1.\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-321 Use of Hard-coded Cryptographic Key", + "cweId": "CWE-321" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks, Inc.", + "product": { + "product_data": [ + { + "product_name": "cRPD", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "23.4R1" + } + ] + } + }, + { + "product_name": "Juniper Cloud Native Router (JCNR)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "23.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79106", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79106" + }, + { + "url": "https://supportportal.juniper.net/JSA79107", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79107" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79106 JSA79107", + "defect": [ + "1698624" + ], + "discovery": "INTERNAL" + }, + "work_around": [ + { + "lang": "en", + "value": "Remove the hard coded keys using:\n\n \"rm -rf /etc/ssh/ssh_host_*\" \n\nand then run \n\n \"ssh-keygen -A\" \n\nto generate new host keys.\n" + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue: 

JCNR: 23.4, and all subsequent releases.

cRPD: 23.4R1, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\u00a0\n\nJCNR: 23.4, and all subsequent releases.\n\ncRPD: 23.4R1, and all subsequent releases.\n\n\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30409.json b/2024/30xxx/CVE-2024-30409.json index 506d70fcbd3..a7e3b0f412d 100644 --- a/2024/30xxx/CVE-2024-30409.json +++ b/2024/30xxx/CVE-2024-30409.json @@ -1,17 +1,162 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30409", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated attacker to cause the forwarding information base telemetry daemon (fibtd) to crash, leading to a limited Denial of Service.\u00a0\n\nThis issue affects Juniper Networks\n\n Junos OS:\n * from 22.1 before 22.1R1-S2, 22.1R2.\n\n\nJunos OS Evolved:\u00a0\n * from 22.1 before 22.1R1-S2-EVO, 22.1R2-EVO.\n\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-754: Improper Check for Unusual or Exceptional Conditions", + "cweId": "CWE-754" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service(DoS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos OS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "22.1", + "version_value": "22.1R1-S2. 22.1R2" + } + ] + } + }, + { + "product_name": "Junos OS Evolved", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "22.1-EVO", + "version_value": "22.1R1-S2-EVO, 22.1R2-EVO" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79099", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79099" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79099", + "defect": [ + "1658771" + ], + "discovery": "INTERNAL" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "This issue is seen if the following conditions are met:
  • Telemetry is enabled
" + } + ], + "value": "This issue is seen if the following conditions are met: * Telemetry is enabled\n\n\n" + } + ], + "work_around": [ + { + "lang": "en", + "value": "There are no known workarounds for this issue" + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue: 

Junos OS: 22.1R1-S2, 22.1R2, 22.2R1, 22.2R2, 22.3R1, 22.4R1, and all subsequent releases.

Junos OS Evolved: 22.1R1-S2-EVO, 22.1R2-EVO, 22.2R1-EVO, 22.2R2-EVO, 22.3R1-EVO, 22.4R1-EVO, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\u00a0\n\nJunos OS:\u00a022.1R1-S2, 22.1R2, 22.2R1, 22.2R2, 22.3R1, 22.4R1, and all subsequent releases.\nJunos OS Evolved: 22.1R1-S2-EVO, 22.1R2-EVO, 22.2R1-EVO, 22.2R2-EVO, 22.3R1-EVO, 22.4R1-EVO, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/30xxx/CVE-2024-30410.json b/2024/30xxx/CVE-2024-30410.json index ddc38b92383..ae6d257d861 100644 --- a/2024/30xxx/CVE-2024-30410.json +++ b/2024/30xxx/CVE-2024-30410.json @@ -1,17 +1,152 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-30410", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "sirt@juniper.net", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Incorrect Behavior Order in the routing engine (RE) of Juniper Networks Junos OS on EX4300 Series allows traffic intended to the device to reach the RE\u00a0instead of being discarded when the\u00a0discard term is set in loopback (lo0) interface. The intended function is that the lo0 firewall filter takes precedence over the revenue interface firewall filter.\u00a0\n\nThis issue affects only IPv6 firewall filter.\n\nThis issue only affects the EX4300 switch. No other products or platforms are affected by this vulnerability.\u00a0\n\nThis issue affects Juniper Networks Junos OS:\n\n * All versions before 20.4R3-S10,\n * from 21.2 before 21.2R3-S7,\n * from 21.4 before 21.4R3-S6.\u00a0\n\n\n\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-696: Incorrect Behavior Order", + "cweId": "CWE-696" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Juniper Networks", + "product": { + "product_data": [ + { + "product_name": "Junos ", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "20.4R3-S10" + }, + { + "version_affected": "<", + "version_name": "21.2", + "version_value": "21.2R3-S7" + }, + { + "version_affected": "<", + "version_name": "21.4", + "version_value": "21.4R3-S6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://supportportal.juniper.net/JSA79100", + "refsource": "MISC", + "name": "https://supportportal.juniper.net/JSA79100" + }, + { + "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", + "refsource": "MISC", + "name": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-av217" + }, + "source": { + "advisory": "JSA79100", + "defect": [ + "1775558" + ], + "discovery": "USER" + }, + "configuration": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "
This issue affects Junos OS device with IPv6 firewall filter configured for both lo0 interface and revenue interface (ex- ge-0/0/0):

 [firewall family inet6 filter]
" + } + ], + "value": "This issue affects Junos OS device with IPv6 firewall filter configured for both lo0 interface and revenue interface (ex- ge-0/0/0):\n\n\u00a0[firewall family inet6 filter]\n\n\n" + } + ], + "work_around": [ + { + "lang": "en", + "value": "When lo0 filter is applied before the revenue interface (ex. ge-0/0/0) filter this issue could be avoided.\n" + } + ], + "exploit": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

" + } + ], + "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\n\n" + } + ], + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

The following software releases have been updated to resolve this specific issue: 

Junos OS: 20.4R3-S10, 21.2R3-S7, 21.4R3-S6, and all subsequent releases.

" + } + ], + "value": "The following software releases have been updated to resolve this specific issue:\u00a0\n\nJunos OS: 20.4R3-S10, 21.2R3-S7, 21.4R3-S6, and all subsequent releases.\n\n" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "version": "3.1" } ] } diff --git a/2024/31xxx/CVE-2024-31069.json b/2024/31xxx/CVE-2024-31069.json index e89792d6f96..08ec2ee169d 100644 --- a/2024/31xxx/CVE-2024-31069.json +++ b/2024/31xxx/CVE-2024-31069.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-31069", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IO-1020 Micro ELD web server uses a default password for authentication.\n\n" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1392 ", + "cweId": "CWE-1392" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IOSiX", + "product": { + "product_data": [ + { + "product_name": "IO-1020 Micro ELD", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "360" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-093-01" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "advisory": "ICSA-24-093-01", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "\n

IOSIX recommends users update to 360.

\n

For further support, contact IOSiX.\n\n

" + } + ], + "value": "IOSIX recommends users update to 360.\n\nFor further support, contact IOSiX https://www2.iosix.com/support-2/ .\n\n" + } + ], + "credits": [ + { + "lang": "en", + "value": "Jake Jepson of Colorado State University reported these vulnerabilities to CISA." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/31xxx/CVE-2024-31391.json b/2024/31xxx/CVE-2024-31391.json index d0aed128fde..bd6252f804e 100644 --- a/2024/31xxx/CVE-2024-31391.json +++ b/2024/31xxx/CVE-2024-31391.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-31391", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Insertion of Sensitive Information into Log File vulnerability in the Apache Solr Operator.\n\nThis issue affects all versions of the Apache Solr Operator from 0.3.0 through 0.8.0.\n\nWhen asked to bootstrap Solr security, the operator will enable basic authentication and create several accounts for accessing Solr: including the \"solr\" and \"admin\" accounts for use by end-users, and a \"k8s-oper\" account which the operator uses for its own requests to Solr.\nOne common source of these operator requests is healthchecks: liveness, readiness, and startup probes are all used to determine Solr's health and ability to receive traffic.\nBy default, the operator configures the Solr APIs used for these probes to be exempt from authentication, but\u00a0users may specifically request that authentication be required on probe endpoints as well.\nWhenever one of these probes would fail, if authentication was in use, the Solr Operator would create a Kubernetes \"event\" containing the username and password of the \"k8s-oper\" account.\n\nWithin the affected version range, this vulnerability affects any solrcloud resource which (1) bootstrapped security through use of the `.solrOptions.security.authenticationType=basic` option, and (2) required authentication be used on probes by setting `.solrOptions.security.probesRequireAuth=true`.\n\nUsers are recommended to upgrade to Solr Operator version 0.8.1, which fixes this issue by ensuring that probes no longer print the credentials used for Solr requests.\u00a0 Users may also mitigate the vulnerability by disabling authentication on their healthcheck probes using the setting `.solrOptions.security.probesRequireAuth=false`.\n" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-532 Insertion of Sensitive Information into Log File", + "cweId": "CWE-532" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apache Software Foundation", + "product": { + "product_data": [ + { + "product_name": "Apache Solr Operator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0.3.0", + "version_value": "0.8.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://lists.apache.org/thread/w7011s78lzywzwyszvy4d8zm99ybt8c7", + "refsource": "MISC", + "name": "https://lists.apache.org/thread/w7011s78lzywzwyszvy4d8zm99ybt8c7" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "defect": [ + "SOLR-17216" + ], + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Flip Hess" + } + ] } \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3691.json b/2024/3xxx/CVE-2024-3691.json index 588b048e990..49d570997ba 100644 --- a/2024/3xxx/CVE-2024-3691.json +++ b/2024/3xxx/CVE-2024-3691.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3691", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Small CRM 3.0. Affected by this issue is some unknown functionality of the component Registration Page. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260480." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in PHPGurukul Small CRM 3.0 entdeckt. Davon betroffen ist unbekannter Code der Komponente Registration Page. Dank der Manipulation mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PHPGurukul", + "product": { + "product_data": [ + { + "product_name": "Small CRM", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.260480", + "refsource": "MISC", + "name": "https://vuldb.com/?id.260480" + }, + { + "url": "https://vuldb.com/?ctiid.260480", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.260480" + }, + { + "url": "https://vuldb.com/?submit.312975", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.312975" + }, + { + "url": "https://github.com/nikhil-aniill/Small-CRM-CVE", + "refsource": "MISC", + "name": "https://github.com/nikhil-aniill/Small-CRM-CVE" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "nanilkumar.n8197 (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 7.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.5, + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ] } diff --git a/2024/3xxx/CVE-2024-3695.json b/2024/3xxx/CVE-2024-3695.json index 920e121636f..ff670e1f634 100644 --- a/2024/3xxx/CVE-2024-3695.json +++ b/2024/3xxx/CVE-2024-3695.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3695", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in SourceCodester Computer Laboratory Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260482 is the identifier assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "In SourceCodester Computer Laboratory Management System 1.0 wurde eine problematische Schwachstelle gefunden. Betroffen ist eine unbekannte Verarbeitung der Datei /classes/Users.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "SourceCodester", + "product": { + "product_data": [ + { + "product_name": "Computer Laboratory Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.260482", + "refsource": "MISC", + "name": "https://vuldb.com/?id.260482" + }, + { + "url": "https://vuldb.com/?ctiid.260482", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.260482" + }, + { + "url": "https://vuldb.com/?submit.314071", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.314071" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Computer%20Laboratory%20Management%20System%20using%20PHP%20and%20MySQL%20-%20vuln%202.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/Computer%20Laboratory%20Management%20System%20using%20PHP%20and%20MySQL%20-%20vuln%202.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" } ] } diff --git a/2024/3xxx/CVE-2024-3696.json b/2024/3xxx/CVE-2024-3696.json index f012a347e2f..21aa2f1c1f5 100644 --- a/2024/3xxx/CVE-2024-3696.json +++ b/2024/3xxx/CVE-2024-3696.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-3696", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Campcodes House Rental Management System 1.0 and classified as critical. This issue affects some unknown processing of the file view_payment.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260483." + }, + { + "lang": "deu", + "value": "Eine kritische Schwachstelle wurde in Campcodes House Rental Management System 1.0 gefunden. Betroffen davon ist ein unbekannter Prozess der Datei view_payment.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection", + "cweId": "CWE-89" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Campcodes", + "product": { + "product_data": [ + { + "product_name": "House Rental Management System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.260483", + "refsource": "MISC", + "name": "https://vuldb.com/?id.260483" + }, + { + "url": "https://vuldb.com/?ctiid.260483", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.260483" + }, + { + "url": "https://vuldb.com/?submit.314199", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.314199" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%201.pdf", + "refsource": "MISC", + "name": "https://github.com/E1CHO/cve_hub/blob/main/House%20Rental%20Management%20System/House%20Rental%20Management%20System%20-%20vuln%201.pdf" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SSL_Seven_Security Lab_WangZhiQiang_XiaoZiLong (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2024/3xxx/CVE-2024-3710.json b/2024/3xxx/CVE-2024-3710.json new file mode 100644 index 00000000000..4a0280d017b --- /dev/null +++ b/2024/3xxx/CVE-2024-3710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3711.json b/2024/3xxx/CVE-2024-3711.json new file mode 100644 index 00000000000..eb13adc2f84 --- /dev/null +++ b/2024/3xxx/CVE-2024-3711.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3711", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3712.json b/2024/3xxx/CVE-2024-3712.json new file mode 100644 index 00000000000..7d7638bb4e0 --- /dev/null +++ b/2024/3xxx/CVE-2024-3712.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3712", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/3xxx/CVE-2024-3713.json b/2024/3xxx/CVE-2024-3713.json new file mode 100644 index 00000000000..77a5f57794d --- /dev/null +++ b/2024/3xxx/CVE-2024-3713.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-3713", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file