{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-30390","assignerOrgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","state":"PUBLISHED","assignerShortName":"juniper","dateReserved":"2024-03-26T23:06:17.994Z","datePublished":"2024-04-12T15:24:51.279Z","dateUpdated":"2024-08-02T01:32:07.113Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Junos OS Evolved","vendor":"Juniper Networks","versions":[{"lessThan":"21.4R3-S4-EVO","status":"affected","version":"0","versionType":"semver"},{"lessThan":"22.1R3-S3-EVO","status":"affected","version":"22.1-EVO","versionType":"semver"},{"lessThan":"22.2R3-S2-EVO","status":"affected","version":"22.2-EVO","versionType":"semver"},{"lessThan":"22.3R2-S1-EVO, 22.3R3-EVO","status":"affected","version":"22.3-EVO","versionType":"semver"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In order to be impacted by this issue the system needs to be configured with a connection-limit and a rate-limit for at least one of the following protocols / services. This can either be done explicit as shown below, but please note that these options are also in effect by default.<br><br>&nbsp; [ system services ( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control | tftp-server ) connection-limit &lt;limit&gt; ]<br>&nbsp; \n\n<span style=\"background-color: rgb(255, 255, 255);\">[ system services \n\n( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control \n\n| tftp-server\n\n)\n\n</span>rate-limit &lt;limit&gt; ]<br>"}],"value":"In order to be impacted by this issue the system needs to be configured with a connection-limit and a rate-limit for at least one of the following protocols / services. This can either be done explicit as shown below, but please note that these options are also in effect by default.\n\n  [ system services ( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control | tftp-server ) connection-limit <limit> ]\n  \n\n[ system services \n\n( finger | ftp | netconf | ssh | telnet | xnm-clear-text | xnm-ssl | rest control \n\n| tftp-server\n\n)\n\nrate-limit <limit> ]"}],"datePublic":"2024-04-10T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited&nbsp;<span style=\"background-color: rgb(255, 255, 255);\">Denial of Service (DoS) to the management plane.<br><br>When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't consider existing connections anymore for subsequent connection attempts so that the connection&nbsp;limit can be exceeded.<br></span><p>This issue affects Junos OS Evolved:</p><p></p><ul><li>All versions before 21.4R3-S4-EVO,</li><li>22.1-EVO versions before 22.1R3-S3-EVO,</li><li>22.2-EVO versions before 22.2R3-S2-EVO,&nbsp;</li><li>22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO<span style=\"background-color: var(--wht);\">.</span></li></ul><p></p>"}],"value":"An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane.\n\nWhen an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't consider existing connections anymore for subsequent connection attempts so that the connection limit can be exceeded.\nThis issue affects Junos OS Evolved:\n\n\n\n  *  All versions before 21.4R3-S4-EVO,\n  *  22.1-EVO versions before 22.1R3-S3-EVO,\n  *  22.2-EVO versions before 22.2R3-S2-EVO, \n  *  22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"value":"Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-307","description":"CWE-307 Improper Restriction of Excessive Authentication Attempts","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"Denial-of-Service (DoS)","lang":"en"}]}],"providerMetadata":{"orgId":"8cbe9d5a-a066-4c94-8978-4b15efeae968","shortName":"juniper","dateUpdated":"2024-05-16T20:21:54.917Z"},"references":[{"tags":["vendor-advisory"],"url":"http://supportportal.juniper.net/JSA79183"},{"tags":["technical-description"],"url":"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The following software releases have been updated to resolve this specific issue:<br>Junos OS Evolved: 20.4R3-S9-EVO, 21.4R3-S4-EVO, 22.1R3-S3-EVO, 22.2R3-S2-EVO, 22.3R2-S1-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases."}],"value":"The following software releases have been updated to resolve this specific issue:\nJunos OS Evolved: 20.4R3-S9-EVO, 21.4R3-S4-EVO, 22.1R3-S3-EVO, 22.2R3-S2-EVO, 22.3R2-S1-EVO, 22.3R3-EVO, 22.4R1-EVO, and all subsequent releases."}],"source":{"advisory":"JSA79183","defect":["1709385"],"discovery":"INTERNAL"},"title":"Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There are no known workarounds for this issue.</p><p>To reduce the risk of exploitation use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts.</p>"}],"value":"There are no known workarounds for this issue.\n\nTo reduce the risk of exploitation use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-30390","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-17T13:03:42.660154Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:39:04.373Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:32:07.113Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"http://supportportal.juniper.net/JSA79183"},{"tags":["technical-description","x_transferred"],"url":"https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}]}]}}