First published: Thu Jul 11 2024(Updated: )
An Improper Check for Unusual or Exceptional Conditions vulnerability in the the IKE daemon (iked) of Juniper Networks Junos OS on SRX Series, MX Series with SPC3 and NFX350 allows allows an unauthenticated, network-based attacker sending specific mismatching parameters as part of the IPsec negotiation to trigger an iked crash leading to Denial of Service (DoS). This issue is applicable to all platforms that run iked. This issue affects Junos OS on SRX Series, MX Series with SPC3 and NFX350: * All versions before 21.2R3-S8, * from 21.4 before 21.4R3-S7, * from 22.1 before 22.1R3-S2, * from 22.2 before 22.2R3-S1, * from 22.3 before 22.3R2-S1, 22.3R3, * from 22.4 before 22.4R1-S2, 22.4R2, 22.4R3.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.2R3-S8>21.4<21.4R3-S7>22.1<22.1R3-S2>22.2<22.2R3-S1>22.3<22.3R2-S1>=22.3R3>22.4<22.4R1-S2>=22.4R2>=22.4R3 |
The following software releases have been updated to resolve this specific issue: Junos OS: 21.2R3-S8, 21.4R3-S7, 22.1R3-J1, 22.1R3-S2, 22.2R3-S1, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2, 22.4R3, 23.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39545 has been rated as a high severity vulnerability.
CVE-2024-39545 affects Juniper Networks Junos OS on SRX Series, MX Series with SPC3, and NFX350 devices.
To fix CVE-2024-39545, it is recommended to apply the latest software updates from Juniper Networks.
CVE-2024-39545 exploits an improper check for unusual or exceptional conditions in the IKE daemon of Junos OS.
Yes, CVE-2024-39545 can be exploited by unauthenticated, network-based attackers.