Rewterz
Threat Actors Use Formbook Malware and Agent Tesla to Target Polish Companies – Active IOCs
July 31, 2024
Rewterz
Mandrake Spyware Discovered After 2 Years in Google Play Store Apps – Active IOCs
July 31, 2024

Multiple Juniper Networks Junos OS Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2024-39541 CVSS:6.5

Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by an improper handling of exceptional conditions vulnerability in the Routing Protocol Daemon (rpd). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.

CVE-2024-39560 CVSS:6.5

Juniper Networks Junos OS and Junos OS Evolved are vulnerable to a denial of service, caused by improper handling of exceptional conditions in the routing protocol daemon (RPD). By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-39533 CVSS:5.8

Juniper Networks Junos OS could allow a remote attacker to bypass security restrictions, caused by an unimplemented or unsupported feature in the UI vulnerability. By sending a specially crafted request, an attacker could exploit this vulnerability to cause a minor integrity impact to downstream networks.

Impact

  • Denial of Service

Indicators of Compromise

CVE

  • CVE-2024-39541
  • CVE-2024-39560
  • CVE-2024-39533

Affected Vendors

Juniper

Affected Products

  • Juniper Networks Junos OS
  • Juniper Networks Junos OS 21.2
  • Juniper Networks Junos OS 21.4
  • Juniper Networks Junos OS 22.1
  • Juniper Networks Junos OS 22.3
  • Juniper Networks Junos OS 22.2
  • Juniper Networks Junos OS Evolved 22.1-EVO
  • Juniper Networks Junos OS Evolved 22.2-EVO
  • Juniper Networks Junos OS 22.4
  • Juniper Networks Junos OS 23.2
  • Juniper Networks Junos OS Evolved 23.2
  • Juniper Networks Junos OS Evolved 22.4
  • Juniper Networks Junos OS Evolved 22.4-EVO

Remediation

Refer to Juniper Networks Security Advisory for patch, upgrade or suggested workaround information.

CVE-2024-39541

CVE-2024-39560

CVE-2024-39533