First published: Fri Apr 12 2024(Updated: )
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS). When Layer 2 traffic is sent through a logical interface, MAC learning happens. If during this process, the interface flaps, an Advanced Forwarding Toolkit manager (evo-aftmand-bt) core is observed. This leads to a PFE restart. The crash reoccurs if the same sequence of events happens, which will lead to a sustained DoS condition. This issue affects Juniper Networks Junos OS Evolved 23.2-EVO versions earlier than 23.2R1-S1-EVO, 23.2R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS Evolved | <23.2R1-S1-EVO<23.2R2-EVO | |
Juniper Junos os Evolved | =23.2 | |
Juniper Junos os Evolved | =23.2-r1 |
The following software releases have been updated to resolve this specific issue: 23.2R1-S1-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30403 has a high severity rating due to its potential to cause a Denial of Service (DoS).
To mitigate CVE-2024-30403, upgrade Juniper Networks Junos OS Evolved to version 23.2R2-EVO or later.
CVE-2024-30403 affects specific versions of Juniper Networks Junos OS Evolved up to version 23.2R1-S1-EVO.
CVE-2024-30403 is classified as a NULL Pointer Dereference vulnerability in the Packet Forwarding Engine.
CVE-2024-30403 can be exploited by an unauthenticated, adjacent attacker, allowing them to cause a Denial of Service.