First published: Fri Oct 11 2024(Updated: )
A Deadlock vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). When a large amount of traffic is processed by ATP Cloud inspection, a deadlock can occur which will result in a PFE crash and restart. Whether the crash occurs, depends on system internal timing that is outside the attackers control. This issue affects Junos OS on SRX Series: * All versions before 21.3R3-S1, * 21.4 versions before 21.4R3, * 22.1 versions before 22.1R2, * 22.2 versions before 22.2R1-S2, 22.2R2.
Credit: sirt@juniper.net
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper Junos | <21.3R3-S1<21.4R3<22.1R2<22.2R1-S2<22.2R2 |
The following software releases have been updated to resolve this specific issue: 21.3R3-S1, 21.4R3, 22.1R2, 22.2R1-S2, 22.2R2, 22.3R1, and all subsequent releases.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47506 has been rated as a high severity vulnerability due to its potential to cause Denial of Service.
To mitigate CVE-2024-47506, update affected Juniper Networks Junos OS versions to the latest patched version.
CVE-2024-47506 affects Juniper Networks Junos OS on SRX Series devices running specific versions up to 22.2R2.
CVE-2024-47506 allows an unauthenticated attacker to induce a Denial of Service by causing a deadlock in the packet forwarding engine.
Yes, CVE-2024-47506 can be exploited by a remote attacker without authentication.