An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buffer overflow, leading to a reboot of the FPC.

Through code review, it was determined that the interface definition code for aftman could read beyond a buffer boundary, leading to a stack-based buffer overflow.
This issue affects Junos OS on MX Series and EX9200-15C:


* from 21.2 before 21.2R3-S1,
* from 21.4 before 21.4R3,
* from 22.1 before 22.1R2,
* from 22.2 before 22.2R2; 




This issue does not affect:



* versions of Junos OS prior to 20.3R1;
* any version of Junos OS 20.4.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-28322 An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman of Juniper Networks Junos OS on MX Series with MPC10E, MPC11, MX10K-LC9600 line cards, MX304, and EX9200-15C, may allow an attacker to exploit a stack-based buffer overflow, leading to a reboot of the FPC. Through code review, it was determined that the interface definition code for aftman could read beyond a buffer boundary, leading to a stack-based buffer overflow. This issue affects Junos OS on MX Series and EX9200-15C: * from 21.2 before 21.2R3-S1, * from 21.4 before 21.4R3, * from 22.1 before 22.1R2, * from 22.2 before 22.2R2;  This issue does not affect: * versions of Junos OS prior to 20.3R1; * any version of Junos OS 20.4.
Fixes

Solution

The following software releases have been updated to resolve this specific issue: Junos OS: 21.2R3-S1, 21.4R3, 22.1R2, 22.2R2, 22.3R1, and all subsequent releases.


Workaround

There are no known workarounds for this issue.

History

Fri, 23 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Juniper
Juniper ex9200-15c
Juniper junos
Juniper lc9600
Juniper mpc10e-10c
Juniper mpc10e-15c
Juniper mpc11
Juniper mx10004
Juniper mx10008
Juniper mx2008
Juniper mx2010
Juniper mx2020
Juniper mx204
Juniper mx240
Juniper mx304
Juniper mx480
Juniper mx960
CPEs cpe:2.3:h:juniper:ex9200-15c:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:lc9600:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mpc10e-10c:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mpc10e-15c:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mpc11:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*
cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*
cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*
Vendors & Products Juniper
Juniper ex9200-15c
Juniper junos
Juniper lc9600
Juniper mpc10e-10c
Juniper mpc10e-15c
Juniper mpc11
Juniper mx10004
Juniper mx10008
Juniper mx2008
Juniper mx2010
Juniper mx2020
Juniper mx204
Juniper mx240
Juniper mx304
Juniper mx480
Juniper mx960

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: juniper

Published:

Updated: 2024-08-02T01:32:07.287Z

Reserved: 2024-03-26T23:06:19.980Z

Link: CVE-2024-30401

cve-icon Vulnrichment

Updated: 2024-08-02T01:32:07.287Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-12T16:15:39.713

Modified: 2026-01-23T16:12:00.117

Link: CVE-2024-30401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T11:31:02Z

Weaknesses