Impact
An incorrect synchronization bug in the Juniper Networks Junos OS and Junos OS Evolved management daemon (mgd) allows a low‑privilege network attacker to repeatedly connect and disconnect NETCONF sessions. The rapid session churn triggers a locking issue that causes mgd processes to hang in a lockf state. When all mgd processes are occupied, new management logons fail and the device becomes unmanageable, requiring a power cycle to recover.
Affected Systems
The flaw affects Juniper Networks Junos OS and Junos OS Evolved on versions prior to 23.4R2-S4, 24.2R2-S1, 24.4R1-S3 and 24.4R2, as well as the corresponding Evolved releases before 23.4R2-S5-EVO, 24.2R2-S1-EVO, 24.4R1-S3-EVO and 24.4R2-EVO. Versions before 23.4R1 for either family are not impacted.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.1, indicating a high severity. Exploitation requires only network access and low privileges on the device, making the attack vector likely to be initiated from inside the network or from compromised hosts with modest credentials. Because EPSS data is unavailable and the issue is not listed in the KEV catalog, the market exploitation probability is uncertain, but the high CVSS and straightforward operational conditions suggest that the risk to environments with exposed NETCONF interfaces is significant.
OpenCVE Enrichment