First published: Thu Jul 11 2024(Updated: )
An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS). Continued receipt and processing of these specific packets will sustain the Denial of Service condition. The memory usage can be monitored using the below command. user@host> show usp memory segment sha data objcache jsf This issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC: * 20.4 before 20.4R3-S10, * 21.2 before 21.2R3-S6, * 21.3 before 21.3R3-S5, * 21.4 before 21.4R3-S6, * 22.1 before 22.1R3-S4, * 22.2 before 22.2R3-S2, * 22.3 before 22.3R3-S1, * 22.4 before 22.4R3, * 23.2 before 23.2R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <20.4R3-S10<21.2R3-S6<21.3R3-S5<21.4R3-S6<22.1R3-S4<22.2R3-S2<22.3R3-S1<22.4R3<23.2R2 |
The following software releases have been updated to resolve this specific issue: Junos OS: 20.4R3-S10, 21.2R3-S6, 21.3R3-S5, 21.4R3-S6, 22.1R3-S4, 22.2R3-S2, 22.3R3-S1, 22.4R3, 23.2R2, 23.4R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39551 has been rated as a medium severity vulnerability.
To mitigate CVE-2024-39551, upgrade your Junos OS to the latest patched version that is beyond the affected versions.
CVE-2024-39551 affects Juniper Networks Junos OS running on SRX and MX Series devices with specific hardware configurations.
CVE-2024-39551 can lead to uncontrolled resource consumption and potential traffic loss.
Yes, CVE-2024-39551 can be exploited by an unauthenticated network-based attacker.