Impact
A stack‑based buffer overflow exists in the Packet Forwarding Engine of Junos OS. When an attacker subscribes to telemetry sensors at a large scale, all FPC connections drop, the FPC crashes, and the device restarts, resulting in a denial‑of‑service condition. The problem is triggered by low‑privilege, network‑based attackers and does not grant code execution, but it can disrupt network services.
Affected Systems
The vulnerability affects Juniper Networks Junos OS, specifically all releases before 22.4R3‑S7, before 23.2R2‑S4, and before 23.4R2. Devices running those versions are susceptible to the crash when they subscribe to telemetry sensors.
Risk and Exploitability
The CVSS score of 7.1 indicates moderate severity, while the EPSS score of less than 1 % shows a very low probability of exploitation at the current time. The issue is not listed in the CISA Known Exploited Vulnerabilities catalog, and no workaround exists. The likely attack vector is inferred to be network‑based through the subscription of telemetry sensors, and an attacker only needs low‑privilege access to trigger the denial of service.
OpenCVE Enrichment