

Rewterz Threat Advisory – CVE-2023-7028 – GitLab Vulnerability
January 15, 2024
Rewterz Threat Advisory – Multiple Microsoft Windows Products Vulnerabilities
January 15, 2024
Rewterz Threat Advisory – CVE-2023-7028 – GitLab Vulnerability
January 15, 2024
Rewterz Threat Advisory – Multiple Microsoft Windows Products Vulnerabilities
January 15, 2024Severity
Medium
Analysis Summary
CVE-2024-21597 CVSS:5.3
Juniper Networks Junos OS could allow a remote attacker to bypass security restrictions, caused by an exposure of resource to wrong sphere vulnerability in the Packet Forwarding Engine (PFE). By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the intended access restrictions.
CVE-2024-21602 CVSS:7.5
Juniper Networks Junos OS Evolved is vulnerable to a denial of service, caused by a NULL pointer dereference vulnerability. By sending specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-21589 CVSS:7.4
Juniper Networks Paragon Active Assurance Control Center could allow a remote attacker to obtain sensitive information, caused by an improper access control vulnerability. By sending a specially crafted request, a remote attacker could exploit this vulnerability to obtain sensitive information.
CVE-2024-21587 CVSS:6.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by an improper handling of exceptional conditions vulnerability in the broadband edge subscriber management daemon (bbe-smgd). By sending specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-21601 CVSS:5.9
Juniper Networks Junos OS is vulnerable to a denial of service, caused by a race condition vulnerability in the Flow-processing Daemon (flowd). By sending specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-21603 CVSS:6.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper check for unusual or exceptional conditions by the kernel. By sending specially crafted SNMP requests or CLI commands, a remote authenticated attacker could exploit this vulnerability to cause the device to restart.
CVE-2023-36842 CVSS:6.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper check for unusual or exceptional conditions by the DHCP Daemon (jdhcpd). By sending a specially crafted DHCP packet, a remote attacker could exploit this vulnerability to consume available CPU resource, and results in a denial of service condition.
CVE-2024-21596 CVSS:5.3
Juniper Networks Junos OS and and Junos OS Evolved are vulnerable to a denial of service, caused by a heap-based buffer overflow in the Routing Protocol Daemon (RPD). By sending a specially crafted BGP UPDATE message, a remote attacker could exploit this vulnerability to cause a crash in the backup Routing Engine.
CVE-2024-21595 CVSS:6.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper validation of syntactic correctness of input. By sending a specially crafted ICMP traffic, a remote attacker could exploit this vulnerability to cause the Packet Forwarding Engine (PFE) to hang.
CVE-2024-21616 CVSS:7.5
Juniper Networks Junos OS is vulnerable to a denial of service, caused by improper validation of syntactic correctness of input by the Packet Forwarding Engine (PFE). By sending a specially crafted SIP packet, a remote attacker could exploit this vulnerability to cause NAT IP allocation to fail.
CVE-2024-21591 CVSS:9.8
Juniper Networks Junos OS could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write flaw in the J-Web component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-21612 CVSS:7.5
Juniper Networks Junos OS Evolved is vulnerable to a denial of service, caused by improper handling of syntactically invalid structure by the Object Flooding Protocol (OFP) service. By sending a specially crafted TCP traffic, a remote attacker could exploit this vulnerability to cause OFP to crash.
CVE-2024-21594 CVSS:5.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by a heap-based buffer overflow in the Network Services Daemon (NSD). By sending a specially crafted CLI command, a local authenticated attacker could exploit this vulnerability to cause Flow Processing Daemon (flowd) crash to crash.
CVE-2024-21614 CVSS:7.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by improper check for unusual or exceptional conditions by the Routing Protocol Daemon (RPD). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause the Routing Protocol Daemon (RPD) to crash.
CVE-2024-21613 CVSS:6.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by missing release of memory after effective lifetime by the Routing Protocol Daemon (RPD). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause the Routing Protocol Daemon (RPD) to crash.
Impact
- Denial of Service
- Security Bypass
- Code Execution
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2024-21597
- CVE-2024-21602
- CVE-2024-21589
- CVE-2024-21587
- CVE-2024-21601
- CVE-2024-21603
- CVE-2023-36842
- CVE-2024-21596
- CVE-2024-21595
- CVE-2024-21616
- CVE-2024-21591
- CVE-2024-21612
- CVE-2024-21594
- CVE-2024-21614
- CVE-2024-21613
Affected Vendors
Juniper
Affected Products
- Juniper Networks Junos OS
- Juniper Networks Junos OS Evolved
- Juniper Networks Junos OS 21.2
- Juniper Networks Junos OS 21.3
- Juniper Networks Junos OS 21.4
- Juniper Networks Junos OS Evolved 21.4-EVO
- Juniper Networks Junos OS 22.1
- Juniper Networks Junos OS 22.3
- Juniper Networks Junos OS 22.2
- Juniper Networks Junos OS Evolved 22.1-EVO
- Juniper Networks Junos OS Evolved 22.2-EVO
- Juniper Networks Junos OS 22.4
- Juniper Networks Junos OS 23.2
- Juniper Networks Junos OS Evolved 22.4-EVO
- Juniper Networks Junos OS Evolved 22.3-EVO
- Juniper Networks Paragon Active Assurance Control Center
- Juniper Networks Junos OS Evolved 23.2-EVO
Remediation
Refer to IBM Security Advisory for patch, upgrade or suggested workaround information.