Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-39517 | First vendor Publication | 2024-07-10 |
Vendor | Cve | Last vendor Modification | 2024-07-11 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 6.5 | ||
Base Score | 6.5 | Environmental Score | 6.5 |
impact SubScore | 3.6 | Temporal Score | 6.5 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Adjacent | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
An Improper Check for Unusual or Exceptional Conditions vulnerability in theĀ Layer 2 Address Learning Daemon (l2ald) on Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS). In an EVPN/VXLAN scenario, when a high amount specific Layer 2 packets are processed by the device, it can cause the Routing Protocol Daemon (rpd) to utilize all CPU resources which causes the device to hang. A manual restart of the rpd is required to restore services. This issue affects both IPv4 and IPv6 implementations. This issue affects Junos OS: All versions earlier thanĀ 21.4R3-S7; 22.1Ā versions earlier than 22.1R3-S5; 22.2 versions earlier thanĀ 22.2R3-S3; 22.3 versions earlier thanĀ 22.3R3-S3; 22.4 versions earlier thanĀ 22.4R3-S2; 23.2 versions earlier thanĀ 23.2R2; 23.4 versions earlier thanĀ 23.4R1-S1. Junos OS Evolved: All versions earlier thanĀ 21.4R3-S7-EVO; 22.1-EVO versions earlier thanĀ 22.1R3-S5-EVO; 22.2-EVO versions earlier thanĀ 22.2R3-S3-EVO; 22.3-EVO versions earlier than 22.3R3-S3-EVO; 22.4-EVO versions earlier thanĀ 22.4R3-S2-EVO; 23.2-EVO versions earlier thanĀ 23.2R2-EVO; 23.4-EVO versions earlier thanĀ 23.4R1-S1-EVO, 23.4R2-EVO. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39517 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-07-11 17:27:23 |
|
2024-07-11 05:27:24 |
|