Juniper Networks Junos OS vulnerable to Improper Validation of Specified Type of Input flaw
CVE-2024-47504
Summary
The vulnerability identified in Juniper Networks' Junos OS on the SRX5000 Series pertains to an improper validation of specified types of input. This flaw allows an unauthenticated network-based attacker to exploit the packet forwarding engine, leading to a Denial of Service (DoS) condition. When the device receives a specially crafted malformed packet, it may trigger a crash and subsequent restart of the flowd process, impacting the availability of the network services. Affected versions of the Junos OS include various releases within the 22.x, 23.x, and 24.x series, highlighting the importance of timely updates and patches to mitigate potential risks.
Affected Version(s)
Junos OS SRX5000 Series 22.2 < 22.2R3-S5
Junos OS SRX5000 Series 22.3 < 22.3R3-S4
Junos OS SRX5000 Series 22.4 < 22.4R3-S4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved