CVE-2024-21612

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Jan 12, 2024
Updated: Jan 29, 2024
CWE ID 228

Summary

CVE-2024-21612 is a Denial of Service (DoS) vulnerability affecting the Object Flooding Protocol (OFP) service in Juniper Networks Junos OS Evolved. An unauthenticated, network-based attacker can exploit this Improper Handling of Syntactically Invalid Structure vulnerability by sending specific TCP packets to an open OFP port. Upon receiving these packets, the OFP service crashes, triggering a Routine Engine (RE) restart. Continuous transmission of these packets leads to a sustained DoS condition. This issue impacts Juniper Networks Junos OS Evolved on all versions earlier than 21.2R3-S7-EVO, 21.3 versions earlier than 21.3R3-S5-EVO, 21.4 versions earlier than 21.4R3-S5-EVO, 22.1 versions earlier than 22.1R3-S4-EVO, 22.2 versions earlier than 22.2R3-S3-EVO, 22.3 versions earlier than 22.3R3-EVO, and 22.4 versions earlier than 22.4R2-EVO and 22.4R3-EVO.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • Juniper Junos Os Evolved

Affected Vendors

  • Juniper Networks

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-21612 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions