An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.
This issue affects Junos OS:
21.2 releases from 21.2R3-S5 before 21.2R3-S6.
This issue does not affect earlier or later releases.
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA83000 | Vendor Advisory |
https://supportportal.juniper.net/JSA83000 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
11 Apr 2025, 14:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* |
|
First Time |
Juniper mx240
Juniper srx110 Juniper srx300 Juniper srx1500 Juniper Juniper srx220 Juniper srx4100 Juniper srx550m Juniper srx320 Juniper srx5800 Juniper srx240 Juniper srx3600 Juniper srx345 Juniper srx650 Juniper csrx Juniper srx1600 Juniper srx240m Juniper srx5000 Juniper srx5400 Juniper srx340 Juniper srx4300 Juniper srx4000 Juniper srx4200 Juniper srx2300 Juniper vsrx Juniper mx960 Juniper srx100 Juniper junos Juniper srx550 Hm Juniper srx1400 Juniper mx480 Juniper srx550 Juniper srx3400 Juniper srx210 Juniper srx380 Juniper srx4600 Juniper srx5600 Juniper srx240h2 Juniper srx4700 |
|
References | () https://supportportal.juniper.net/JSA83000 - Vendor Advisory |
21 Nov 2024, 09:27
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://supportportal.juniper.net/JSA83000 - |
11 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-11 17:15
Updated : 2025-04-11 14:50
NVD link : CVE-2024-39540
Mitre link : CVE-2024-39540
CVE.ORG link : CVE-2024-39540
JSON object : View
Products Affected
juniper
- srx5400
- srx4600
- srx4200
- junos
- srx300
- srx240h2
- srx1600
- mx960
- srx5800
- srx5600
- srx240
- srx210
- srx2300
- srx4300
- srx5000
- srx220
- srx110
- mx480
- mx240
- srx1400
- srx240m
- csrx
- srx4700
- srx320
- srx4000
- vsrx
- srx345
- srx650
- srx3600
- srx1500
- srx4100
- srx340
- srx3400
- srx100
- srx550m
- srx380
- srx550_hm
- srx550
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions