An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on SRX Series, and MX Series with SPC3 allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
When an affected device receives specific valid TCP traffic, the pfe crashes and restarts leading to a momentary but complete service outage.
This issue affects Junos OS:
21.2 releases from 21.2R3-S5 before 21.2R3-S6.
This issue does not affect earlier or later releases.
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA83000 | Vendor Advisory |
https://supportportal.juniper.net/JSA83000 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
11 Apr 2025, 14:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* |
|
First Time |
Juniper srx650
Juniper srx5000 Juniper mx240 Juniper srx210 Juniper srx3400 Juniper mx960 Juniper srx240m Juniper srx110 Juniper srx1500 Juniper vsrx Juniper srx5600 Juniper srx100 Juniper srx4100 Juniper srx550 Hm Juniper srx4700 Juniper srx240h2 Juniper Juniper srx4000 Juniper srx220 Juniper srx340 Juniper srx4600 Juniper srx3600 Juniper srx2300 Juniper srx550 Juniper srx1400 Juniper csrx Juniper srx300 Juniper srx345 Juniper srx240 Juniper srx4200 Juniper srx4300 Juniper srx320 Juniper mx480 Juniper junos Juniper srx5800 Juniper srx1600 Juniper srx380 Juniper srx5400 Juniper srx550m |
|
References | () https://supportportal.juniper.net/JSA83000 - Vendor Advisory |
Information
Published : 2024-07-11 17:15
Updated : 2025-04-11 14:50
NVD link : CVE-2024-39540
Mitre link : CVE-2024-39540
CVE.ORG link : CVE-2024-39540
JSON object : View
Products Affected
juniper
- srx240
- srx300
- srx4100
- srx5400
- srx1600
- csrx
- srx345
- junos
- srx550
- srx320
- srx1400
- srx5600
- srx3400
- srx5000
- srx550_hm
- mx960
- srx4600
- srx240h2
- srx4200
- srx220
- srx1500
- srx550m
- srx4000
- srx210
- vsrx
- mx240
- srx4300
- srx650
- srx5800
- srx2300
- mx480
- srx340
- srx110
- srx4700
- srx380
- srx240m
- srx100
- srx3600
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions