2024-07-18 14:03:13 +00:00

60 lines
3.2 KiB
JSON

{
"id": "CVE-2024-21586",
"sourceIdentifier": "sirt@juniper.net",
"published": "2024-07-01T17:15:05.193",
"lastModified": "2024-07-18T12:15:02.647",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nIf an affected device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition.\n\nThis issue affects Junos OS on SRX Series:\n\n * 21.4 versions before 21.4R3-S7.9,\n * 22.1 versions before 22.1R3-S5.3,\n * 22.2 versions before 22.2R3-S4.11,\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R3.\n\n\n\n\n\n\nThis issue affects Junos OS on NFX Series:\n\n * 21.4 versions before 21.4R3-S8,\n * 22.1 versions after 22.1R1,\n * 22.2 versions before 22.2R3-S5,\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R3.\n\n\n\n\n\n\nJunos OS versions prior to 21.4R1 are not affected by this issue."
},
{
"lang": "es",
"value": "Una verificaci\u00f3n inadecuada de la vulnerabilidad de condiciones inusuales o excepcionales en el motor de reenv\u00edo de paquetes (PFE) de Juniper Networks Junos OS en la serie SRX permite que un atacante basado en red no autenticado provoque una denegaci\u00f3n de servicio (DoS). Si un dispositivo de la serie SRX recibe tr\u00e1fico v\u00e1lido espec\u00edfico destinado al dispositivo, provocar\u00e1 que el PFE falle y se reinicie. La recepci\u00f3n y procesamiento continuo de este tr\u00e1fico crear\u00e1 una condici\u00f3n DoS sostenida. Este problema afecta a Junos OS en la serie SRX: * versiones 21.4 anteriores a 21.4R3-S7.9, * versiones 22.1 anteriores a 22.1R3-S5.3, * versiones 22.2 anteriores a 22.2R3-S4.11, * versiones 22.3 anteriores a 22.3R3, * Versiones 22.4 anteriores a 22.4R3. Las versiones de Junos OS anteriores a la 21.4R1 no se ven afectadas por este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@juniper.net",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "sirt@juniper.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://supportportal.juniper.net/JSA83195",
"source": "sirt@juniper.net"
}
]
}