

Threat Actors Use Formbook Malware and Agent Tesla to Target Polish Companies – Active IOCs
July 31, 2024
Mandrake Spyware Discovered After 2 Years in Google Play Store Apps – Active IOCs
July 31, 2024
Threat Actors Use Formbook Malware and Agent Tesla to Target Polish Companies – Active IOCs
July 31, 2024
Mandrake Spyware Discovered After 2 Years in Google Play Store Apps – Active IOCs
July 31, 2024Severity
Medium
Analysis Summary
CVE-2024-39541 CVSS:6.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by an improper handling of exceptional conditions vulnerability in the Routing Protocol Daemon (rpd). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-39560 CVSS:6.5
Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by improper handling of exceptional conditions in the routing protocol daemon (RPD). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVE-2024-39533 CVSS:5.8
Juniper Networks Junos OS could allow a remote attacker to bypass security restrictions, caused by an unimplemented or unsupported feature in the UI vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to cause a minor integrity impact to downstream networks.
Impact
- Denial of Service
Indicators of Compromise
CVE
- CVE-2024-39541
- CVE-2024-39560
- CVE-2024-39533
Affected Vendors
Affected Products
- Juniper Networks Junos OS
- Juniper Networks Junos OS 21.2
- Juniper Networks Junos OS 21.4
- Juniper Networks Junos OS 22.1
- Juniper Networks Junos OS 22.3
- Juniper Networks Junos OS 22.2
- Juniper Networks Junos OS Evolved 22.1-EVO
- Juniper Networks Junos OS Evolved 22.2-EVO
- Juniper Networks Junos OS 22.4
- Juniper Networks Junos OS 23.2
- Juniper Networks Junos OS Evolved 23.2
- Juniper Networks Junos OS Evolved 22.4
- Juniper Networks Junos OS Evolved 22.4-EVO
Remediation
Refer to Juniper Networks Security Advisory for patch, upgrade or suggested workaround information.