

Joint Advisory Alerts of Telecom Networks Targeted in PRC-Backed Cyber Espionage
December 5, 2024
Multiple Cisco Identity Services Engine Vulnerabilities
December 5, 2024
Joint Advisory Alerts of Telecom Networks Targeted in PRC-Backed Cyber Espionage
December 5, 2024
Multiple Cisco Identity Services Engine Vulnerabilities
December 5, 2024Severity
High
Analysis Summary
CVE-2024-47504 CVSS:7.5
An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos). When a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart.
CVE-2024-47499 CVSS:7.5
An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network based attacker to cause a Denial of Service (DoS). In a scenario where BGP Monitoring Protocol (BMP) is configured with rib-in pre-policy monitoring, receiving a BGP update with a specifically malformed AS PATH attribute over an established BGP session, can cause an RPD crash and restart.
CVE-2024-47497 CVSS:7.5
An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS). An attacker can send specific HTTPS connection requests to the device, triggering the creation of processes that are not properly terminated. Over time, this leads to resource exhaustion, ultimately causing the device to crash and restart.
CVE-2024-47490 CVSS:8.2
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, network based attacker to cause increased consumption of resources, ultimately resulting in a Denial of Service (DoS). When specific transit MPLS packets are received by the PFE, these packets are internally forwarded to the Routing Engine (RE), rather than being handled appropriately.
CVE-2024-39563 CVSS:7.3
A Command Injection vulnerability in Juniper Networks Junos Space allows an unauthenticated, network-based attacker sending a specially crafted request to execute arbitrary shell commands on the Junos Space Appliance, leading to remote command execution by the web application, gaining complete control of the device. A specific script in the Junos Space web application allows attacker-controlled input from a GET request without sufficient input sanitization.
Impact
- Denial of Service
- Gain Access
Indicators of Compromise
CVE
- CVE-2024-47504
- CVE-2024-47499
- CVE-2024-47497
- CVE-2024-47490
- CVE-2024-39563
Affected Vendors
Affected Products
- Juniper Networks Junos OS - 22.2 - 22.3 - 22.4 - 23.2 - 23.4 - 24.2
- Juniper Networks Junos OS - 0 - 21.4 - 22.2 - 22.3 - 22.4 - 23.2 - 23.4
- Juniper Networks Junos OS Evolved - 0 - 21.4 - 22.2 - 22.3 - 22.4 - 23.2 - 23.4
- Juniper Networks Junos OS - 0 - 22.2 - 22.3 - 22.4 - 23.2 - 23.4
- Juniper Networks Junos OS Evolved - 0 - 22.2-EVO - 22.3-EVO - 22.4-EVO - 23.2-EVO - 23.4-EVO
- Juniper Networks Junos Space - 24.1R1
Remediation
Refer to Juniper Networks Security Advisory for patch, upgrade or suggested workaround information.