First published: Fri Oct 11 2024(Updated: )
An Unimplemented or Unsupported Feature in UI vulnerability in the CLI of Juniper Networks Junos OS Evolved on QFX5000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS). Several configuration statements meant to enforce limits on MAC learning and moves can be configured but do not take effect. This can lead to control plane overload situations which will severely impact the ability of the device to processes legitimate traffic. This issue affects Junos OS Evolved on QFX5000 Series: * All versions before 21.4R3-S8-EVO, * 22.2-EVO versions before 22.2R3-S5-EVO, * 22.4-EVO versions before 22.4R3-EVO, * 23.2-EVO versions before 23.2R2-EVO.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Networks Junos OS | <21.4R3-S8-EVO | |
Juniper Networks Junos OS | <22.2R3-S5-EVO | |
Juniper Networks Junos OS | <22.4R3-EVO | |
Juniper Networks Junos OS | <23.2R2-EVO |
The following software releases have been updated to resolve this specific issue: 21.4R3-S8-EVO, 22.2R3-S5-EVO*, 22.4R3-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases. (* future release)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47498 has been classified as a medium-severity vulnerability due to its potential for causing Denial-of-Service (DoS).
To fix CVE-2024-47498, update your Junos OS Evolved to a non-vulnerable version as specified in the vendor's security advisory.
CVE-2024-47498 affects Juniper Networks Junos OS Evolved on various versions of the QFX5000 Series.
CVE-2024-47498 requires an adjacent attacker, making remote exploitation not possible without local access.
CVE-2024-47498 can be exploited to cause Denial-of-Service (DoS), disrupting normal operations of affected systems.