Juniper Junos OS Evolved aftmand Mem DoS ( 23.2R2-EVO)
CVE-2024-39548 Published on July 11, 2024
Junos OS Evolved: Receipt of specific packets in the aftmand process will lead to a memory leak
An Uncontrolled Resource Consumption vulnerability in the aftmand process of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to consume memory resources, resulting in a Denial of Service (DoS) condition. The processes do not recover on their own and must be manually restarted.
This issue affects both IPv4 and IPv6.
Changes in memory usage can be monitored using the following CLI command:
user@device> show system memory node <fpc slot> | grep evo-aftmann
This issue affects Junos OS Evolved:
* All versions before 21.2R3-S8-EVO,
* 21.3 versions before 21.3R3-S5-EVO,
* 21.4 versions before 21.4R3-S5-EVO,
* 22.1 versions before 22.1R3-S4-EVO,
* 22.2 versions before 22.2R3-S4-EVO,
* 22.3 versions before 22.3R3-S3-EVO,
* 22.4 versions before 22.4R2-S2-EVO, 22.4R3-EVO,
* 23.2 versions before 23.2R1-S1-EVO, 23.2R2-EVO.
Vulnerability Analysis
CVE-2024-39548 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Timeline
Initial Publication
Weakness Type
What is a Resource Exhaustion Vulnerability?
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2024-39548 has been classified to as a Resource Exhaustion vulnerability or weakness.
Products Associated with CVE-2024-39548
Want to know whenever a new CVE is published for Juniper Networks Junos Os Evolved? stack.watch will email you.
Affected Versions
Juniper Networks Junos OS Evolved:- Before 21.2R3-S8-EVO is affected.
- Version 21.3 and below 21.3R3-S5-EVO is affected.
- Version 21.4 and below 21.4R3-S5-EVO is affected.
- Version 22.1 and below 22.1R3-S4-EVO is affected.
- Version 22.2 and below 22.2R3-S4 is affected.
- Version 22.3 and below 22.3R3-S3-EVO is affected.
- Version 22.4 and below 22.4R2-S2-EVO, 22.4R3-EVO is affected.
- Version 23.2 and below 23.2R1-S1-EVO, 23.2R2-EVO is affected.
- Before 21.2R3-S8-EVO is affected.
- Version 21.3 and below 21.3R3-S5-EVO is affected.
- Version 21.4 and below 21.4R3-S5-EVO is affected.
- Version 22.1 and below 22.1R3-S4-EVO is affected.
- Version 22.2 and below 22.2R3-S4 is affected.
- Version 22.3 and below 22.3R3-S3-EVO is affected.
- Version 22.4 and below 22.4R2-S2-EVO is affected.
- Version 22.4 and below 22.4R3-EVO is affected.
- Version 23.2 and below 23.2R1-S1-EVO is affected.
- Version 23.2 and below 23.2R2-EVO is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.