First published: Fri Apr 12 2024(Updated: )
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows a locally authenticated attacker with low privileges to cause a Denial-of-Service (Dos). If a specific CLI command is issued, a PFE crash will occur. This will cause traffic forwarding to be interrupted until the system self-recovers. This issue affects Junos OS: All versions before 20.4R3-S10, 21.2 versions before 21.2R3-S7, 21.4 versions before 21.4R3-S6.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <20.4R3-S10 | |
Juniper Networks Junos OS | <21.2R3-S7 | |
Juniper Networks Junos OS | <21.4R3-S6 | |
All of | ||
Any of | ||
Juniper JUNOS | <20.4 | |
Juniper JUNOS | =20.4 | |
Juniper JUNOS | =20.4-r1 | |
Juniper JUNOS | =20.4-r1-s1 | |
Juniper JUNOS | =20.4-r2 | |
Juniper JUNOS | =20.4-r2-s1 | |
Juniper JUNOS | =20.4-r2-s2 | |
Juniper JUNOS | =20.4-r3 | |
Juniper JUNOS | =20.4-r3-s1 | |
Juniper JUNOS | =20.4-r3-s2 | |
Juniper JUNOS | =20.4-r3-s3 | |
Juniper JUNOS | =20.4-r3-s4 | |
Juniper JUNOS | =20.4-r3-s5 | |
Juniper JUNOS | =20.4-r3-s6 | |
Juniper JUNOS | =20.4-r3-s7 | |
Juniper JUNOS | =20.4-r3-s8 | |
Juniper JUNOS | =20.4-r3-s9 | |
Juniper JUNOS | =21.2 | |
Juniper JUNOS | =21.2-r1 | |
Juniper JUNOS | =21.2-r1-s1 | |
Juniper JUNOS | =21.2-r1-s2 | |
Juniper JUNOS | =21.2-r2 | |
Juniper JUNOS | =21.2-r2-s1 | |
Juniper JUNOS | =21.2-r2-s2 | |
Juniper JUNOS | =21.2-r3 | |
Juniper JUNOS | =21.2-r3-s1 | |
Juniper JUNOS | =21.2-r3-s2 | |
Juniper JUNOS | =21.2-r3-s3 | |
Juniper JUNOS | =21.2-r3-s4 | |
Juniper JUNOS | =21.2-r3-s5 | |
Juniper JUNOS | =21.2-r3-s6 | |
Juniper JUNOS | =21.4-r1 | |
Juniper JUNOS | =21.4-r1-s1 | |
Juniper JUNOS | =21.4-r1-s2 | |
Juniper JUNOS | =21.4-r2 | |
Juniper JUNOS | =21.4-r2-s1 | |
Juniper JUNOS | =21.4-r2-s2 | |
Juniper JUNOS | =21.4-r3 | |
Juniper JUNOS | =21.4-r3-s1 | |
Juniper JUNOS | =21.4-r3-s2 | |
Juniper JUNOS | =21.4-r3-s3 | |
Juniper JUNOS | =21.4-r3-s4 | |
Juniper JUNOS | =21.4-r3-s5 | |
Any of | ||
Juniper EX4300 | ||
Juniper ex4300-24p | ||
Juniper ex4300-24p-s | ||
Juniper ex4300-24t | ||
Juniper ex4300-24t-s | ||
Juniper ex4300-32f | ||
Juniper ex4300-32f-dc | ||
Juniper ex4300-32f-s | ||
Juniper ex4300-48mp | ||
Juniper ex4300-48mp-s | ||
Juniper ex4300-48p | ||
Juniper ex4300-48p-s | ||
Juniper ex4300-48t | ||
Juniper ex4300-48t-afi | ||
Juniper ex4300-48t-dc | ||
Juniper ex4300-48t-dc-afi | ||
Juniper ex4300-48t-s |
The following software releases have been updated to resolve this specific issue: 20.4R3-S10, 21.2R3-S7, 21.4R3-S6, and all subsequent releases of these branches.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30384 has been assigned a CVSS score indicating a medium severity vulnerability with potential for Denial-of-Service.
To mitigate CVE-2024-30384, update Junos OS to the latest recommended version that addresses this vulnerability.
CVE-2024-30384 affects Juniper Networks Junos OS running on EX4300 Series devices.
CVE-2024-30384 is categorized as an Improper Check for Unusual or Exceptional Conditions, leading to a Denial-of-Service.
No, CVE-2024-30384 requires a locally authenticated attacker with low privileges to exploit.