Impact
An improper check for unusual or exceptional conditions in the chassis control daemon (chassisd) allows a local attacker with low privileges to execute a specific 'show chassis' command that causes the daemon to crash and restart. The crash results in a momentary loss of all network traffic until the system fully recovers, effectively creating a denial of service. The weakness is identified as CWE-754, a type of improper resource handling problem.
Affected Systems
The vulnerability affects Juniper Networks Junos OS running on SRX1600, SRX2300 and SRX4300 platforms. Versions of Junos OS prior to 24.4R1-S3 and 24.4R2 are impacted; any releases 24.4R1-S3, 24.4R2, 25.2R1 or later address the issue. Earlier Junos OS releases before 24.4R1 are not affected.
Risk and Exploitability
The CVSS score of 6.8 classifies this as a moderate severity vulnerability. No EPSS score is available, and it is not listed in CISA’s KEV catalog. The attack vector is local, requiring the attacker to have low‑privilege access to the device’s command line. Once the vulnerable command is executed, the impact is immediate and affects the entire device’s operation. The lack of an EPSS score means typical exploitation likelihood cannot be quantified, but the moderate score and local nature suggest that an attacker who has gained foothold on the device could reliably cause a denial of service.
OpenCVE Enrichment