We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)
Ok

THREATINT
PUBLISHED

CVE-2024-30390

Junos OS Evolved: Connection limits is not being enforced while the resp. rate limit is being enforced

Reserved:2024-03-26
Published:2024-04-12
Updated:2024-05-16

Description

An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane. When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesn't consider existing connections anymore for subsequent connection attempts so that the connection limit can be exceeded. This issue affects Junos OS Evolved: * All versions before 21.4R3-S4-EVO, * 22.1-EVO versions before 22.1R3-S3-EVO, * 22.2-EVO versions before 22.2R3-S2-EVO,  * 22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-307 Improper Restriction of Excessive Authentication Attempts

Denial-of-Service (DoS)

Product status

Default status
unaffected

Any version before 21.4R3-S4-EVO
affected

22.1-EVO before 22.1R3-S3-EVO
affected

22.2-EVO before 22.2R3-S2-EVO
affected

22.3-EVO before 22.3R2-S1-EVO, 22.3R3-EVO
affected

References

http://supportportal.juniper.net/JSA79183 vendor-advisory

https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N technical-description

cve.org CVE-2024-30390

nvd.nist.gov CVE-2024-30390

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-30390