CVE-2024-21612

HIGH

Juniper Junos OS Evolved < 21.2 - Denial of Service

Title source: rule
STIX 2.1

Description

An Improper Handling of Syntactically Invalid Structure vulnerability in Object Flooding Protocol (OFP) service of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS). On all Junos OS Evolved platforms, when specific TCP packets are received on an open OFP port, the OFP crashes leading to a restart of Routine Engine (RE). Continuous receipt of these specific TCP packets will lead to a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS Evolved * All versions earlier than 21.2R3-S7-EVO; * 21.3 versions earlier than 21.3R3-S5-EVO ; * 21.4 versions earlier than 21.4R3-S5-EVO; * 22.1 versions earlier than 22.1R3-S4-EVO; * 22.2 versions earlier than 22.2R3-S3-EVO ; * 22.3 versions earlier than 22.3R3-EVO; * 22.4 versions earlier than 22.4R2-EVO, 22.4R3-EVO.

Scores

CVSS v3 7.5
EPSS 0.0019
EPSS Percentile 40.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-228
Status published
Products (5)
juniper/junos_os_evolved 21.2 (14 CPE variants)
juniper/junos_os_evolved 21.3 (11 CPE variants)
juniper/junos_os_evolved 21.4 (12 CPE variants)
juniper/junos_os_evolved 22.1 (10 CPE variants)
juniper/junos_os_evolved 22.2 (3 CPE variants)
Published Jan 12, 2024
Tracked Since Feb 18, 2026