mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-12 02:04:49 +00:00
100 lines
3.8 KiB
JSON
100 lines
3.8 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-39540",
|
||
|
"sourceIdentifier": "sirt@juniper.net",
|
||
|
"published": "2024-07-11T17:15:12.883",
|
||
|
"lastModified": "2024-07-11T17:15:12.883",
|
||
|
"vulnStatus": "Received",
|
||
|
"cveTags": [],
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nWhen an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.\n\nThis issue affects Junos OS:\n\n21.2 releases from 21.2R3-S5 before 21.2R3-S6.\n\nThis issue does not affect earlier or later releases."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV40": [
|
||
|
{
|
||
|
"source": "sirt@juniper.net",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "4.0",
|
||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"attackRequirements": "NONE",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"vulnerableSystemConfidentiality": "NONE",
|
||
|
"vulnerableSystemIntegrity": "NONE",
|
||
|
"vulnerableSystemAvailability": "HIGH",
|
||
|
"subsequentSystemConfidentiality": "NONE",
|
||
|
"subsequentSystemIntegrity": "NONE",
|
||
|
"subsequentSystemAvailability": "LOW",
|
||
|
"exploitMaturity": "NOT_DEFINED",
|
||
|
"confidentialityRequirements": "NOT_DEFINED",
|
||
|
"integrityRequirements": "NOT_DEFINED",
|
||
|
"availabilityRequirements": "NOT_DEFINED",
|
||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||
|
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||
|
"safety": "NOT_DEFINED",
|
||
|
"automatable": "NOT_DEFINED",
|
||
|
"recovery": "NOT_DEFINED",
|
||
|
"valueDensity": "NOT_DEFINED",
|
||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||
|
"providerUrgency": "NOT_DEFINED",
|
||
|
"baseScore": 8.7,
|
||
|
"baseSeverity": "HIGH"
|
||
|
}
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "sirt@juniper.net",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "NONE",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 7.5,
|
||
|
"baseSeverity": "HIGH"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 3.6
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "sirt@juniper.net",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-754"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://supportportal.juniper.net/JSA83000",
|
||
|
"source": "sirt@juniper.net"
|
||
|
}
|
||
|
]
|
||
|
}
|