First published: Fri Apr 12 2024(Updated: )
An Improper Handling of Exceptional Conditions vulnerability in the Class of Service daemon (cosd) of Juniper Networks Junos OS on MX Series allows an authenticated, network-based attacker with low privileges to cause a limited Denial of Service (DoS). In a scaled subscriber scenario when specific low privileged commands, received over NETCONF, SSH or telnet, are handled by cosd on behalf of mgd, the respective child management daemon (mgd) processes will get stuck. In case of (Netconf over) SSH this leads to stuck SSH sessions, so that when the connection-limit for SSH is reached new sessions can't be established anymore. A similar behavior will be seen for telnet etc. Stuck mgd processes can be monitored by executing the following command: user@host> show system processes extensive | match mgd | match sbwait This issue affects Juniper Networks Junos OS on MX Series: All versions earlier than 20.4R3-S9; 21.2 versions earlier than 21.2R3-S7; 21.3 versions earlier than 21.3R3-S5; 21.4 versions earlier than 21.4R3-S5; 22.1 versions earlier than 22.1R3-S4; 22.2 versions earlier than 22.2R3-S3; 22.3 versions earlier than 22.3R3-S2; 22.4 versions earlier than 22.4R3; 23.2 versions earlier than 23.2R1-S2, 23.2R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Junos OS Evolved | <20.4 | |
Junos OS Evolved | =20.4 | |
Junos OS Evolved | =20.4-r1 | |
Junos OS Evolved | =20.4-r1-s1 | |
Junos OS Evolved | =20.4-r2 | |
Junos OS Evolved | =20.4-r2-s1 | |
Junos OS Evolved | =20.4-r2-s2 | |
Junos OS Evolved | =20.4-r3 | |
Junos OS Evolved | =20.4-r3-s1 | |
Junos OS Evolved | =20.4-r3-s2 | |
Junos OS Evolved | =20.4-r3-s3 | |
Junos OS Evolved | =20.4-r3-s4 | |
Junos OS Evolved | =20.4-r3-s5 | |
Junos OS Evolved | =20.4-r3-s6 | |
Junos OS Evolved | =20.4-r3-s7 | |
Junos OS Evolved | =20.4-r3-s8 | |
Junos OS Evolved | =21.2 | |
Junos OS Evolved | =21.2-r1 | |
Junos OS Evolved | =21.2-r1-s1 | |
Junos OS Evolved | =21.2-r1-s2 | |
Junos OS Evolved | =21.2-r2 | |
Junos OS Evolved | =21.2-r2-s1 | |
Junos OS Evolved | =21.2-r2-s2 | |
Junos OS Evolved | =21.2-r3 | |
Junos OS Evolved | =21.2-r3-s1 | |
Junos OS Evolved | =21.2-r3-s2 | |
Junos OS Evolved | =21.2-r3-s3 | |
Junos OS Evolved | =21.2-r3-s4 | |
Junos OS Evolved | =21.2-r3-s5 | |
Junos OS Evolved | =21.2-r3-s6 | |
Junos OS Evolved | =21.3 | |
Junos OS Evolved | =21.3-r1 | |
Junos OS Evolved | =21.3-r1-s1 | |
Junos OS Evolved | =21.3-r1-s2 | |
Junos OS Evolved | =21.3-r2 | |
Junos OS Evolved | =21.3-r2-s1 | |
Junos OS Evolved | =21.3-r2-s2 | |
Junos OS Evolved | =21.3-r3 | |
Junos OS Evolved | =21.3-r3-s1 | |
Junos OS Evolved | =21.3-r3-s2 | |
Junos OS Evolved | =21.3-r3-s3 | |
Junos OS Evolved | =21.3-r3-s4 | |
Junos OS Evolved | =21.4 | |
Junos OS Evolved | =21.4-r1 | |
Junos OS Evolved | =21.4-r1-s1 | |
Junos OS Evolved | =21.4-r1-s2 | |
Junos OS Evolved | =21.4-r2 | |
Junos OS Evolved | =21.4-r2-s1 | |
Junos OS Evolved | =21.4-r2-s2 | |
Junos OS Evolved | =21.4-r3 | |
Junos OS Evolved | =21.4-r3-s1 | |
Junos OS Evolved | =21.4-r3-s2 | |
Junos OS Evolved | =21.4-r3-s3 | |
Junos OS Evolved | =21.4-r3-s4 | |
Junos OS Evolved | =22.1 | |
Junos OS Evolved | =22.1-r1 | |
Junos OS Evolved | =22.1-r1-s1 | |
Junos OS Evolved | =22.1-r1-s2 | |
Junos OS Evolved | =22.1-r2 | |
Junos OS Evolved | =22.1-r2-s1 | |
Junos OS Evolved | =22.1-r2-s2 | |
Junos OS Evolved | =22.1-r3 | |
Junos OS Evolved | =22.1-r3-s1 | |
Junos OS Evolved | =22.1-r3-s2 | |
Junos OS Evolved | =22.1-r3-s3 | |
Junos OS Evolved | =22.2 | |
Junos OS Evolved | =22.2-r1 | |
Junos OS Evolved | =22.2-r1-s1 | |
Junos OS Evolved | =22.2-r1-s2 | |
Junos OS Evolved | =22.2-r2 | |
Junos OS Evolved | =22.2-r2-s1 | |
Junos OS Evolved | =22.2-r2-s2 | |
Junos OS Evolved | =22.2-r3 | |
Junos OS Evolved | =22.2-r3-s1 | |
Junos OS Evolved | =22.2-r3-s2 | |
Junos OS Evolved | =22.3 | |
Junos OS Evolved | =22.3-r1 | |
Junos OS Evolved | =22.3-r1-s1 | |
Junos OS Evolved | =22.3-r1-s2 | |
Junos OS Evolved | =22.3-r2 | |
Junos OS Evolved | =22.3-r2-s1 | |
Junos OS Evolved | =22.3-r2-s2 | |
Junos OS Evolved | =22.3-r3 | |
Junos OS Evolved | =22.3-r3-s1 | |
Junos OS Evolved | =22.4 | |
Junos OS Evolved | =22.4-r1 | |
Junos OS Evolved | =22.4-r1-s1 | |
Junos OS Evolved | =22.4-r1-s2 | |
Junos OS Evolved | =22.4-r2 | |
Junos OS Evolved | =22.4-r2-s1 | |
Junos OS Evolved | =22.4-r2-s2 | |
Junos OS Evolved | =23.2 | |
Junos OS Evolved | =23.2-r1 | |
Junos OS Evolved | =23.2-r1-s1 | |
Any of | ||
Juniper MX Series | ||
Juniper MX10 | ||
Juniper MX10000 | ||
Juniper MX10003 | ||
Juniper MX10004 | ||
Juniper MX10008 | ||
Juniper MX10016 | ||
Juniper MX104 | ||
Juniper MX150 | ||
Juniper MX2008 | ||
Juniper MX2010 | ||
Juniper MX2020 | ||
Juniper MX204 | ||
Juniper MX240 | ||
Juniper MX304 | ||
Juniper MX40 | ||
Juniper MX480 | ||
Juniper MX5 | ||
Juniper MX80 | ||
Juniper MX960 | ||
Juniper JUNOS | <20.4R3-S9<21.2R3-S7<21.3R3-S5<21.4R3-S5<22.1R3-S4<22.2R3-S3<22.3R3-S2<22.4R3<23.2R1-S2<23.2R2 |
The following software releases have been updated to resolve this specific issue: Junos OS: 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2, 23.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21610 has been assessed to have a low severity due to its potential to cause only a limited Denial of Service.
To mitigate CVE-2024-21610, update Junos OS to a version later than 23.2R2.
CVE-2024-21610 affects users of Juniper Networks Junos OS on MX Series devices running specified vulnerable versions.
CVE-2024-21610 is categorized as an Improper Handling of Exceptional Conditions vulnerability.
Yes, CVE-2024-21610 can be exploited by an authenticated, network-based attacker.