First published: Fri Apr 12 2024(Updated: )
An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). Specific valid link-local traffic is not blocked on ports in STP blocked state but is instead sent to the control plane of the device. This leads to excessive resource consumption and in turn severe impact on all control and management protocols of the device. This issue affects Juniper Networks Junos OS: * 21.2 version 21.2R3-S3 and later versions earlier than 21.2R3-S6; * 22.1 version 22.1R3 and later versions earlier than 22.1R3-S4; * 22.2 version 22.2R2 and later versions earlier than 22.2R3-S2; * 22.3 version 22.3R2 and later versions earlier than 22.3R3-S1; * 22.4 versions earlier than 22.4R2-S2, 22.4R3; * 23.2 versions earlier than 23.2R1-S1, 23.2R2. This issue does not affect Juniper Networks Junos OS 21.4R1 and later versions of 21.4.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | >=21.2R3-S3<21.2R3-S6>=22.1R3<22.1R3-S4>=22.2R2<22.2R3-S2>=22.3R2<22.3R3-S1<22.4R2-S2<22.4R3<23.2R1-S1<23.2R2 | |
All of | ||
Any of | ||
Juniper JUNOS | =21.2-r3-s3 | |
Juniper JUNOS | =21.2-r3-s4 | |
Juniper JUNOS | =21.2-r3-s5 | |
Juniper JUNOS | =22.1-r3 | |
Juniper JUNOS | =22.1-r3-s1 | |
Juniper JUNOS | =22.1-r3-s2 | |
Juniper JUNOS | =22.1-r3-s3 | |
Juniper JUNOS | =22.2-r2 | |
Juniper JUNOS | =22.2-r2-s1 | |
Juniper JUNOS | =22.2-r2-s2 | |
Juniper JUNOS | =22.2-r3 | |
Juniper JUNOS | =22.2-r3-s1 | |
Juniper JUNOS | =22.3-r2 | |
Juniper JUNOS | =22.3-r2-s1 | |
Juniper JUNOS | =22.3-r2-s2 | |
Juniper JUNOS | =22.3-r3 | |
Juniper JUNOS | =22.4 | |
Juniper JUNOS | =22.4-r1 | |
Juniper JUNOS | =22.4-r1-s1 | |
Juniper JUNOS | =22.4-r1-s2 | |
Juniper JUNOS | =22.4-r2 | |
Juniper JUNOS | =22.4-r2-s1 | |
Juniper JUNOS | =23.2 | |
Juniper JUNOS | =23.2-r1 | |
Any of | ||
Juniper SRX300 | ||
Juniper SRX320 | ||
Juniper SRX340 | ||
Juniper SRX345 | ||
Juniper SRX380 |
The following software releases have been updated to resolve this specific issue: 21.2R3-S6, 22.1R3-S4, 22.2R3-S2, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21605 is classified as a Denial of Service (DoS) vulnerability with a high severity level.
CVE-2024-21605 affects various versions of Juniper Networks Junos OS on SRX 300 Series devices.
To mitigate CVE-2024-21605, users should upgrade to a non-vulnerable version of Junos OS as recommended by Juniper.
An unauthenticated, adjacent attacker can exploit CVE-2024-21605 to cause a Denial of Service (DoS).
Currently, no specific workaround is suggested for CVE-2024-21605; upgrading to a secure version is the best approach.