First published: Fri Oct 11 2024(Updated: )
An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS). An attacker can send specific HTTPS connection requests to the device, triggering the creation of processes that are not properly terminated. Over time, this leads to resource exhaustion, ultimately causing the device to crash and restart. The following command can be used to monitor the resource usage: user@host> show system processes extensive | match mgd | count This issue affects Junos OS on SRX Series and EX Series: All versions before 21.4R3-S7, from 22.2 before 22.2R3-S4, from 22.3 before 22.3R3-S3, from 22.4 before 22.4R3-S2, from 23.2 before 23.2R2-S1, from 23.4 before 23.4R1-S2, 23.4R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.4R3-S7>=undefined>=undefined>=undefined>=undefined>=undefined |
The following software releases have been updated to resolve this specific issue: 21.4R3-S7, 22.2R3-S4, 22.3R3-S3, 22.4R3-S2, 23.2R2-S1, 23.4R1-S2, 23.4R2, 24.2R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47497 is classified as a high severity vulnerability due to its potential to cause Denial-of-Service (DoS).
To mitigate CVE-2024-47497, update your Junos OS to a version newer than 21.4R3-S7 that addresses this vulnerability.
CVE-2024-47497 affects Juniper Networks Junos OS running on SRX Series, QFX Series, MX Series, and EX Series devices.
CVE-2024-47497 allows unauthenticated, network-based attackers to exploit the vulnerability to potentially cause Denial-of-Service.
CVE-2024-47497 is an unauthenticated vulnerability, allowing attackers to exploit it without needing valid credentials.