Impact
The vulnerability is located in the chassis control daemon of Junos OS on SRX1500, SRX4100, SRX4200, and SRX4600 routers. A local attacker with low‑privilege access can run a specific 'show chassis' command from the CLI, triggering an improper check for unusual conditions in the daemon. When executed, the daemon crashes and automatically restarts, producing a temporary but complete denial of service as all device modules are brought back online. The weakness is classified as CWE‑754.
Affected Systems
Affected devices are Juniper SRX1500, SRX4100, SRX4200, and SRX4600 running Junos OS 23.2 versions older than 23.2R2‑S6, 23.4 versions older than 23.4R2‑S7, 24.2 versions older than 24.2R2‑S2, 24.4 versions older than 24.4R2, and 25.2 versions older than 25.2R1‑S1 or 25.2R2.
Risk and Exploitability
The CVSS score of 6.8 indicates medium severity, but the absence of an EPSS score and a lack of listing in the KEV catalog suggest the vulnerability is not yet widely exploited. The attack requires local CLI access, which could be obtained by a user with low privileges on the device. Because the exploit triggers simply by running the vulnerable command, it is straightforward once local access exists, and the resulting impact is a short service disruption.
OpenCVE Enrichment