First published: Wed Jul 10 2024(Updated: )
An Improper Input Validation vulnerability in the 802.1X Authentication (dot1x) Daemon of Juniper Networks Junos OS allows a local, low-privileged attacker with access to the CLI to cause a Denial of Service (DoS). On running a specific operational dot1x command, the dot1x daemon crashes. An attacker can cause a sustained DoS condition by running this command repeatedly. When the crash occurs, the authentication status of any 802.1x clients is cleared, and any authorized dot1x port becomes unauthorized. The client cannot re-authenticate until the dot1x daemon restarts. This issue affects Junos OS: * All versions before 20.4R3-S10; * 21.2 versions before 21.2R3-S7; * 21.4 versions before 21.4R3-S6; * 22.1 versions before 22.1R3-S5; * 22.2 versions before 22.2R3-S3; * 22.3 versions before 22.3R3-S2; * 22.4 versions before 22.4R3-S1; * 23.2 versions before 23.2R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <20.4R3-S10<21.2R3-S7<21.4R3-S6<22.1R3-S5<22.2R3-S3<22.3R3-S2<22.4R3-S1<23.2R2 | |
Juniper JUNOS | <20.4 | |
Juniper JUNOS | =20.4 | |
Juniper JUNOS | =20.4-r1 | |
Juniper JUNOS | =20.4-r1-s1 | |
Juniper JUNOS | =20.4-r2 | |
Juniper JUNOS | =20.4-r2-s1 | |
Juniper JUNOS | =20.4-r2-s2 | |
Juniper JUNOS | =20.4-r3 | |
Juniper JUNOS | =20.4-r3-s1 | |
Juniper JUNOS | =20.4-r3-s2 | |
Juniper JUNOS | =20.4-r3-s3 | |
Juniper JUNOS | =20.4-r3-s4 | |
Juniper JUNOS | =20.4-r3-s5 | |
Juniper JUNOS | =20.4-r3-s6 | |
Juniper JUNOS | =20.4-r3-s7 | |
Juniper JUNOS | =20.4-r3-s8 | |
Juniper JUNOS | =20.4-r3-s9 | |
Juniper JUNOS | =21.2 | |
Juniper JUNOS | =21.2-r1 | |
Juniper JUNOS | =21.2-r1-s1 | |
Juniper JUNOS | =21.2-r1-s2 | |
Juniper JUNOS | =21.2-r2 | |
Juniper JUNOS | =21.2-r2-s1 | |
Juniper JUNOS | =21.2-r2-s2 | |
Juniper JUNOS | =21.2-r3 | |
Juniper JUNOS | =21.2-r3-s1 | |
Juniper JUNOS | =21.2-r3-s2 | |
Juniper JUNOS | =21.2-r3-s3 | |
Juniper JUNOS | =21.2-r3-s4 | |
Juniper JUNOS | =21.2-r3-s5 | |
Juniper JUNOS | =21.2-r3-s6 | |
Juniper JUNOS | =21.4 | |
Juniper JUNOS | =21.4-r1 | |
Juniper JUNOS | =21.4-r1-s1 | |
Juniper JUNOS | =21.4-r1-s2 | |
Juniper JUNOS | =21.4-r2 | |
Juniper JUNOS | =21.4-r2-s1 | |
Juniper JUNOS | =21.4-r2-s2 | |
Juniper JUNOS | =21.4-r3 | |
Juniper JUNOS | =21.4-r3-s1 | |
Juniper JUNOS | =21.4-r3-s2 | |
Juniper JUNOS | =21.4-r3-s3 | |
Juniper JUNOS | =21.4-r3-s4 | |
Juniper JUNOS | =21.4-r3-s5 | |
Juniper JUNOS | =22.1 | |
Juniper JUNOS | =22.1-r1 | |
Juniper JUNOS | =22.1-r1-s1 | |
Juniper JUNOS | =22.1-r1-s2 | |
Juniper JUNOS | =22.1-r2 | |
Juniper JUNOS | =22.1-r2-s1 | |
Juniper JUNOS | =22.1-r2-s2 | |
Juniper JUNOS | =22.1-r3 | |
Juniper JUNOS | =22.1-r3-s1 | |
Juniper JUNOS | =22.1-r3-s2 | |
Juniper JUNOS | =22.1-r3-s3 | |
Juniper JUNOS | =22.1-r3-s4 | |
Juniper JUNOS | =22.2 | |
Juniper JUNOS | =22.2-r1 | |
Juniper JUNOS | =22.2-r1-s1 | |
Juniper JUNOS | =22.2-r1-s2 | |
Juniper JUNOS | =22.2-r2 | |
Juniper JUNOS | =22.2-r2-s1 | |
Juniper JUNOS | =22.2-r2-s2 | |
Juniper JUNOS | =22.2-r3 | |
Juniper JUNOS | =22.2-r3-s1 | |
Juniper JUNOS | =22.2-r3-s2 | |
Juniper JUNOS | =22.3 | |
Juniper JUNOS | =22.3-r1 | |
Juniper JUNOS | =22.3-r1-s1 | |
Juniper JUNOS | =22.3-r1-s2 | |
Juniper JUNOS | =22.3-r2 | |
Juniper JUNOS | =22.3-r2-s1 | |
Juniper JUNOS | =22.3-r2-s2 | |
Juniper JUNOS | =22.3-r3 | |
Juniper JUNOS | =22.3-r3-s1 | |
Juniper JUNOS | =22.4 | |
Juniper JUNOS | =22.4-r1 | |
Juniper JUNOS | =22.4-r1-s1 | |
Juniper JUNOS | =22.4-r1-s2 | |
Juniper JUNOS | =22.4-r2 | |
Juniper JUNOS | =22.4-r2-s1 | |
Juniper JUNOS | =22.4-r2-s2 | |
Juniper JUNOS | =22.4-r3 | |
Juniper JUNOS | =23.2 | |
Juniper JUNOS | =23.2-r1 | |
Juniper JUNOS | =23.2-r1-s1 | |
Juniper JUNOS | =23.2-r1-s2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39511 is classified as a Denial of Service vulnerability that can be exploited by low-privileged local attackers.
To fix CVE-2024-39511, update your affected Junos OS version to one that is patched according to Juniper's security advisory.
CVE-2024-39511 affects Junos OS versions up to 22.4R3-S1 and includes several earlier versions.
No, CVE-2024-39511 requires local access to the CLI for exploitation.
The vulnerability can lead to a Denial of Service condition, affecting the availability of the 802.1X Authentication daemon.