{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-21605","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2023-12-27T19:38:25.707Z","datePublished":"2024-04-12T14:54:46.590Z","dateUpdated":"2024-08-09T20:09:26.830Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["SRX 300 Series"],"product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"21.2R3-S6","status":"affected","version":"21.2R3-S3","versionType":"semver"},{"lessThan":"22.1R3-S4","status":"affected","version":"22.1R3","versionType":"semver"},{"lessThan":"22.2R3-S2","status":"affected","version":"22.2R2","versionType":"semver"},{"lessThan":"22.3R3-S1","status":"affected","version":"22.3R2","versionType":"semver"},{"lessThan":"22.4R2-S2, 22.4R3","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R1-S1, 23.2R2","status":"affected","version":"23.2","versionType":"semver"},{"lessThan":"21.4*","status":"unaffected","version":"21.4","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"To be affected by this vulnerability at least two interfaces need to be configured with an STP:<br><br>&nbsp; [ protocols (stp | mstp | rstp | vstp) interface &lt;interface&gt; ]"}],"value":"To be affected by this vulnerability at least two interfaces need to be configured with an STP:\n\n  [ protocols (stp | mstp | rstp | vstp) interface <interface> ]"}],"datePublic":"2024-04-10T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n<br><br>\nSpecific valid link-local traffic is not blocked on ports in STP blocked state but is instead sent to the control plane of the device.&nbsp;This leads to excessive resource consumption and in turn severe impact on all control and management protocols of the device.\n<br><br>\nThis issue affects Juniper Networks Junos OS:<br><ul><li>21.2 version 21.2R3-S3 and later versions earlier than 21.2R3-S6;</li><li>22.1 version 22.1R3 and later versions earlier than 22.1R3-S4;</li><li>22.2 version \n\n22.2R2\n\nand later versions earlier than 22.2R3-S2;</li><li>22.3 version \n\n22.3R2 \n\nand later versions earlier than 22.3R3-S1;\n</li><li>22.4 versions earlier than 22.4R2-S2, 22.4R3;</li><li>23.2 versions earlier than 23.2R1-S1, 23.2R2.\n</li></ul>\nThis issue does not affect Juniper Networks Junos OS 21.4R1 and later versions of 21.4.\n\n"}],"value":"An Exposure of Resource to Wrong Sphere vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX 300 Series allows an unauthenticated, adjacent attacker to cause a Denial of Service (DoS).\n\n\n\nSpecific valid link-local traffic is not blocked on ports in STP blocked state but is instead sent to the control plane of the device. This leads to excessive resource consumption and in turn severe impact on all control and management protocols of the device.\n\n\n\nThis issue affects Juniper Networks Junos OS:\n  *  21.2 version 21.2R3-S3 and later versions earlier than 21.2R3-S6;\n  *  22.1 version 22.1R3 and later versions earlier than 22.1R3-S4;\n  *  22.2 version \n\n22.2R2\n\nand later versions earlier than 22.2R3-S2;\n  *  22.3 version \n\n22.3R2 \n\nand later versions earlier than 22.3R3-S1;\n\n  *  22.4 versions earlier than 22.4R2-S2, 22.4R3;\n  *  23.2 versions earlier than 23.2R1-S1, 23.2R2.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS 21.4R1 and later versions of 21.4."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Juniper SIRT is not aware of any malicious exploitation of this vulnerability.</p>"}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":7.1,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-668","description":"CWE-668 Exposure of Resource to Wrong Sphere","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"Denial of Service","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2024-05-16T20:08:03.419Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA75746"},{"tags":["technical-description"],"url":"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The following software releases have been updated to resolve this specific issue: 21.2R3-S6, 22.1R3-S4, 22.2R3-S2, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases.</p>"}],"value":"The following software releases have been updated to resolve this specific issue: 21.2R3-S6, 22.1R3-S4, 22.2R3-S2, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases."}],"source":{"advisory":"JSA75746","defect":["1706933"],"discovery":"USER"},"timeline":[{"lang":"en","time":"2024-04-10T16:00:00.000Z","value":"Initial Publication"}],"title":"Junos OS: SRX 300 Series: Specific link local traffic causes a control plane overload","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p>"}],"value":"There are no known workarounds for this issue."}],"x_generator":{"engine":"Vulnogram 0.1.0-av217"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:27:35.771Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA75746"},{"tags":["technical-description","x_transferred"],"url":"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-09T20:09:17.730960Z","id":"CVE-2024-21605","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-09T20:09:26.830Z"}}]}}