packet forwarding engine (pfe) of Juniper Networks Junos OS on MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS).
In a VPLS or Junos Fusion scenario, the execution of specific show commands will cause all FPCs hosting VPLS sessions or connecting to satellites to crash and restart.
This issue affects Junos on MX304, MX with MPC10/11/LC9600 and EX9200 with EX9200-15C:
* All version before 21.2R3-S1,
* 21.3 versions before 21.3R3,
* 21.4 versions before 21.4R2.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-42504 | A NULL Pointer Dereference vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). In a VPLS or Junos Fusion scenario, the execution of specific show commands will cause all FPCs hosting VPLS sessions or connecting to satellites to crash and restart. This issue affects Junos on MX304, MX with MPC10/11/LC9600 and EX9200 with EX9200-15C: * All version before 21.2R3-S1, * 21.3 versions before 21.3R3, * 21.4 versions before 21.4R2. |
Solution
The following software releases have been updated to resolve this specific issue: 21.2R3-S1, 21.3R3, 21.4R2, 22.1R1, and all subsequent releases.
Workaround
There are no known workarounds for this issue.To reduce the risk of exploitation use access lists or firewall filters to limit access to the device only from trusted, administrative networks, hosts, and users.
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA88131 |
|
Mon, 26 Jan 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper ex9200 Juniper ex9200-15c Juniper junos Juniper mpc10e-10c Juniper mpc10e-15c Juniper mpc11 Juniper mx10003 Juniper mx10004 Juniper mx10008 Juniper mx10016 Juniper mx2008 Juniper mx2010 Juniper mx240 Juniper mx304 Juniper mx480 Juniper mx960 |
|
| CPEs | cpe:2.3:h:juniper:ex9200-15c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc10e-10c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc10e-15c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mpc11:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper
Juniper ex9200 Juniper ex9200-15c Juniper junos Juniper mpc10e-10c Juniper mpc10e-15c Juniper mpc11 Juniper mx10003 Juniper mx10004 Juniper mx10008 Juniper mx10016 Juniper mx2008 Juniper mx2010 Juniper mx240 Juniper mx304 Juniper mx480 Juniper mx960 |
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 11 Oct 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A NULL Pointer Dereference vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C allows a locally authenticated attacker with low privileges to cause a Denial of Service (DoS). In a VPLS or Junos Fusion scenario, the execution of specific show commands will cause all FPCs hosting VPLS sessions or connecting to satellites to crash and restart. This issue affects Junos on MX304, MX with MPC10/11/LC9600 and EX9200 with EX9200-15C: * All version before 21.2R3-S1, * 21.3 versions before 21.3R3, * 21.4 versions before 21.4R2. | |
| Title | Junos OS: MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C: In a VPLS or Junos Fusion scenario specific show commands cause FPCs to crash | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-10-11T17:31:13.526Z
Reserved: 2024-09-25T15:26:52.609Z
Link: CVE-2024-47501
Updated: 2024-10-11T17:31:09.998Z
Status : Analyzed
Published: 2024-10-11T16:15:11.167
Modified: 2026-01-26T18:26:24.647
Link: CVE-2024-47501
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:09:58Z
EUVD