Uncontrolled Resource Consumption vulnerability in Juniper Networks Junos OS
CVE-2024-39551
Summary
An Uncontrolled Resource Consumption vulnerability exists in the H.323 ALG (Application Layer Gateway) within Juniper Networks' Junos OS, particularly affecting SRX Series and MX Series devices equipped with SPC3 and MS-MPC/MIC. This vulnerability allows unauthenticated network-based attackers to send specially crafted packets, causing significant traffic loss that can lead to Denial of Service (DoS) conditions. If the attacker continues to send these packets, the system remains in a sustained DoS state. Device operators can monitor memory usage to detect exploitation through the command: 'show usp memory segment sha data objcache jsf'. The issue impacts various versions of Junos OS across multiple releases, emphasizing the need for immediate attention from affected users.
Affected Version(s)
Junos OS SRX Series 20.4 < 20.4R3-S10
Junos OS SRX Series 21.2 < 21.2R3-S6
Junos OS SRX Series 21.3 < 21.3R3-S5
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved