If an affected device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition.
This issue affects Junos OS on SRX Series:
* 21.4 versions before 21.4R3-S7.9,
* 22.1 versions before 22.1R3-S5.3,
* 22.2 versions before 22.2R3-S4.11,
* 22.3 versions before 22.3R3,
* 22.4 versions before 22.4R3.
This issue affects Junos OS on NFX Series:
* 21.4 versions before 21.4R3-S8,
* 22.1 versions after 22.1R1,
* 22.2 versions before 22.2R3-S5,
* 22.3 versions before 22.3R3,
* 22.4 versions before 22.4R3.
Junos OS versions prior to 21.4R1 are not affected by this issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19234 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series and NFX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an affected device receives specific valid traffic destined to the device, it will cause the PFE to crash and restart. Continued receipt and processing of this traffic will create a sustained DoS condition. This issue affects Junos OS on SRX Series: * 21.4 versions before 21.4R3-S7.9, * 22.1 versions before 22.1R3-S5.3, * 22.2 versions before 22.2R3-S4.11, * 22.3 versions before 22.3R3, * 22.4 versions before 22.4R3. This issue affects Junos OS on NFX Series: * 21.4 versions before 21.4R3-S8, * 22.1 versions after 22.1R1, * 22.2 versions before 22.2R3-S5, * 22.3 versions before 22.3R3, * 22.4 versions before 22.4R3. Junos OS versions prior to 21.4R1 are not affected by this issue. |
Solution
The following software releases have been updated to resolve this specific issue: SRX Series: 21.4R3-S7.9, 22.1R3-S5.3, 22.2R3-S4.11, 22.3R3, 22.4R3, 23.2R1, and all subsequent releases; NFX Series: 21.4R3-S8, 22.2R3-S5*, 22.3R3, 22.4R3, 23.2R1, and all subsequent releases. * Pending publication. Please note that the software versions 21.4R3-S7.9, 22.1R3-S5.3 and 22.2R3-S4.11 are respins of previously released versions, so special attention needs to be paid to the last digits of the version number.
Workaround
There are no known workarounds for this issue.
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA83195 |
|
No history.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-08-01T22:27:34.830Z
Reserved: 2023-12-27T19:38:25.703Z
Link: CVE-2024-21586
Updated: 2024-08-01T22:27:34.830Z
Status : Awaiting Analysis
Published: 2024-07-01T17:15:05.193
Modified: 2024-11-21T08:54:39.897
Link: CVE-2024-21586
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:22:20Z
EUVD