Executive Summary

Informations
Name CVE-2024-39513 First vendor Publication 2024-07-10
Vendor Cve Last vendor Modification 2025-02-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An Improper Input Validation vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved allows a local, low-privileged attacker to cause a Denial of Service (DoS).

When a specific "clear" command is run, the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) crashes and restarts.

The crash impacts all traffic going through the FPCs, causing a DoS. Running the command repeatedly leads to a sustained DoS condition. This issue affects Junos OS Evolved:Â

* All versions before 20.4R3-S9-EVO,Â
* from 21.2-EVO before 21.2R3-S7-EVO,Â
* from 21.3-EVO before 21.3R3-S5-EVO,Â
* from 21.4-EVO before 21.4R3-S6-EVO,Â
* from 22.1-EVO before 22.1R3-S4-EVO,Â
* from 22.2-EVO before 22.2R3-S3-EVO,Â
* from 22.3-EVO before 22.3R3-S3-EVO,Â
* from 22.4-EVO before 22.4R3-EVO,
* from 23.2-EVO before 23.2R2-EVO.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39513

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 131

Sources (Detail)

https://supportportal.juniper.net/JSA82978
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2025-02-08 05:20:51
  • Multiple Updates
2024-11-25 09:24:02
  • Multiple Updates
2024-07-11 17:27:23
  • Multiple Updates
2024-07-11 05:27:24
  • First insertion