THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-30380

Junos OS and Junos OS Evolved: l2cpd crash upon receipt of a specific TLV

Assignerjuniper
Reserved2024-03-26
Published2024-04-16
Updated2024-07-01

Description

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP, ERP, and LLDP.  The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP, leading to a Denial of Service.  Continued receipt and processing of this specific TLV will create a sustained Denial of Service (DoS) condition. This issue affects: Junos OS: all versions before 20.4R3-S9, from 21.2 before 21.2R3-S7, from 21.3 before 21.3R3-S5, from 21.4 before 21.4R3-S4, from 22.1 before 22.1R3-S4, from 22.2 before 22.2R3-S2, from 22.3 before 22.3R2-S2, 22.3R3-S1, from 22.4 before 22.4R2-S2, 22.4R3, from 23.2 before 23.2R1-S1, 23.2R2; Junos OS Evolved: all versions before 21.2R3-S7, from 21.3 before 21.3R3-S5-EVO, from 21.4 before 21.4R3-S5-EVO, from 22.1 before 22.1R3-S4-EVO, from 22.2 before 22.2R3-S2-EVO, from 22.3 before 22.3R2-S2-EVO, 22.3R3-S1-EVO, from 22.4 before 22.4R2-S2-EVO, 22.4R3-EVO, from 23.2 before 23.2R1-S1-EVO, 23.2R2-EVO.



MEDIUM: 6.5CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
HIGH: 7.1CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Problem types

CWE-755 Improper Handling of Exceptional Conditions

Denial of Service (DoS)

Product status

Default status
unaffected

Any version before 20.4R3-S9
affected

21.2 before 21.2R3-S7
affected

21.3 before 21.3R3-S5
affected

21.4 before 21.4R3-S4
affected

22.1 before 22.1R3-S4
affected

22.2 before 22.2R3-S2
affected

22.3 before 22.3R2-S2, 22.3R3-S1
affected

22.4 before 22.4R2-S2, 22.4R3
affected

23.2 before 23.2R1-S1, 23.2R2
affected

Default status
unaffected

Any version before 21.2R3-S7-EVO
affected

21.3 before 21.3R3-S5-EVO
affected

21.4 before 21.4R3-S5-EVO
affected

22.1 before 22.1R3-S4-EVO
affected

22.2 before 22.2R3-S2-EVO
affected

22.3 before 22.3R2-S2-EVO, 22.3R3-S1-EVO
affected

22.4 before 22.4R2-S2-EVO, 22.4R3-EVO
affected

23.2 before 23.2R1-S1-EVO, 23.2R2-EVO
affected

References

https://supportportal.juniper.net/JSA79171 vendor-advisory

https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L technical-description

cve.org CVE-2024-30380

nvd.nist.gov CVE-2024-30380

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-30380
© Copyright 2024 THREATINT. Made in Cyprus with +