{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-30380","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2024-03-26T23:06:12.474Z","datePublished":"2024-04-16T20:04:53.599Z","dateUpdated":"2024-08-02T01:32:07.069Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Junos OS","vendor":"Juniper Networks","versions":[{"lessThan":"20.4R3-S9","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.2R3-S7","status":"affected","version":"21.2","versionType":"semver"},{"lessThan":"21.3R3-S5","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3-S4","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R3-S4","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R3-S2","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R2-S2, 22.3R3-S1","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R2-S2, 22.4R3","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R1-S1, 23.2R2","status":"affected","version":"23.2","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"21.2R3-S7-EVO","status":"affected","version":"0","versionType":"semver"},{"lessThan":"21.3R3-S5-EVO","status":"affected","version":"21.3","versionType":"semver"},{"lessThan":"21.4R3-S5-EVO","status":"affected","version":"21.4","versionType":"semver"},{"lessThan":"22.1R3-S4-EVO","status":"affected","version":"22.1","versionType":"semver"},{"lessThan":"22.2R3-S2-EVO","status":"affected","version":"22.2","versionType":"semver"},{"lessThan":"22.3R2-S2-EVO, 22.3R3-S1-EVO","status":"affected","version":"22.3","versionType":"semver"},{"lessThan":"22.4R2-S2-EVO, 22.4R3-EVO","status":"affected","version":"22.4","versionType":"semver"},{"lessThan":"23.2R1-S1-EVO, 23.2R2-EVO","status":"affected","version":"23.2","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A sample configuration enabling LLDP is shown below:<br><br>\n\n<tt><span style=\"background-color: rgb(40, 44, 52);\">[set protocols lldp interface all]<br><br></span></tt><tt><span style=\"background-color: rgb(40, 44, 52);\">[set interfaces ge-0/0/0 lldp ...]</span></tt><br>\n\n<br>"}],"value":"A sample configuration enabling LLDP is shown below:\n\n\n\n[set protocols lldp interface all]\n\n[set interfaces ge-0/0/0 lldp ...]"}],"datePublic":"2024-04-10T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV.<br><br>The l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP, ERP, and LLDP.&nbsp; The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP, leading to a Denial of Service.&nbsp;&nbsp;Continued receipt and processing of this specific TLV will create a sustained Denial of Service (DoS) condition.<br><p>This issue affects:</p><p>Junos OS: <br>all versions before 20.4R3-S9, <br>from 21.2 before 21.2R3-S7, <br>from 21.3 before 21.3R3-S5, <br>from 21.4 before 21.4R3-S4, <br>from 22.1 before 22.1R3-S4, <br>from 22.2 before 22.2R3-S2, <br>from 22.3 before 22.3R2-S2, 22.3R3-S1, <br>from 22.4 before 22.4R2-S2, 22.4R3, <br>from 23.2 before 23.2R1-S1, 23.2R2;</p><p>Junos OS Evolved: <br>all versions before 21.2R3-S7,\n\n <br>from 21.3 before 21.3R3-S5-EVO, <br>from 21.4 before 21.4R3-S5-EVO, <br>from 22.1 before 22.1R3-S4-EVO, <br>from 22.2 before 22.2R3-S2-EVO, <br>from 22.3 before 22.3R2-S2-EVO, 22.3R3-S1-EVO, <br>from 22.4 before 22.4R2-S2-EVO, 22.4R3-EVO, <br>from 23.2 before 23.2R1-S1-EVO, 23.2R2-EVO.</p>"}],"value":"An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV.\n\nThe l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP, ERP, and LLDP.  The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP, leading to a Denial of Service.  Continued receipt and processing of this specific TLV will create a sustained Denial of Service (DoS) condition.\nThis issue affects:\n\nJunos OS: \nall versions before 20.4R3-S9, \nfrom 21.2 before 21.2R3-S7, \nfrom 21.3 before 21.3R3-S5, \nfrom 21.4 before 21.4R3-S4, \nfrom 22.1 before 22.1R3-S4, \nfrom 22.2 before 22.2R3-S2, \nfrom 22.3 before 22.3R2-S2, 22.3R3-S1, \nfrom 22.4 before 22.4R2-S2, 22.4R3, \nfrom 23.2 before 23.2R1-S1, 23.2R2;\n\nJunos OS Evolved: \nall versions before 21.2R3-S7,\n\n \nfrom 21.3 before 21.3R3-S5-EVO, \nfrom 21.4 before 21.4R3-S5-EVO, \nfrom 22.1 before 22.1R3-S4-EVO, \nfrom 22.2 before 22.2R3-S2-EVO, \nfrom 22.3 before 22.3R2-S2-EVO, 22.3R3-S1-EVO, \nfrom 22.4 before 22.4R2-S2-EVO, 22.4R3-EVO, \nfrom 23.2 before 23.2R1-S1-EVO, 23.2R2-EVO."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":7.1,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-755","description":"CWE-755 Improper Handling of Exceptional Conditions","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"Denial of Service (DoS)","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2024-05-16T18:02:13.456Z"},"references":[{"tags":["vendor-advisory"],"url":"https://supportportal.juniper.net/JSA79171"},{"tags":["technical-description"],"url":"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue: <br>Junos OS: 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S4, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases.\n<br>Junos OS Evolved:&nbsp;21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.2R1-S1-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases."}],"value":"The following software releases have been updated to resolve this specific issue: \nJunos OS: 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S4, 22.1R3-S4, 22.2R3-S2, 22.3R2-S2, 22.3R3-S1, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases.\n\nJunos OS Evolved: 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.4R2-S2-EVO, 22.4R3-EVO, 23.2R1-S1-EVO, 23.2R2-EVO, 23.4R1-EVO, and all subsequent releases."}],"source":{"advisory":"JSA79171","defect":["1748720"],"discovery":"INTERNAL"},"title":"Junos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p>"}],"value":"There are no known workarounds for this issue."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-01T18:16:07.416039Z","id":"CVE-2024-30380","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-01T18:16:14.031Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:32:07.069Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://supportportal.juniper.net/JSA79171"},{"tags":["technical-description","x_transferred"],"url":"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L"}]}]}}