An Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on MX Series and EX9200 Series allows an unauthenticated, network-based attacker to cause partial impact to the integrity of the device.
If the "tcp-reset" option is added to the "reject" action in an IPv6 filter which matches on "payload-protocol", packets are permitted instead of rejected. This happens because the payload-protocol match criteria is not supported in the kernel filter causing it to accept all packets without taking any other action. As a fix the payload-protocol match will be treated the same as a "next-header" match to avoid this filter bypass.
This issue doesn't affect IPv4 firewall filters.
This issue affects Juniper Networks Junos OS on MX Series and EX9200 Series:
* All versions earlier than 20.4R3-S7;
* 21.1 versions earlier than 21.1R3-S5;
* 21.2 versions earlier than 21.2R3-S5;
* 21.3 versions earlier than 21.3R3-S4;
* 21.4 versions earlier than 21.4R3-S4;
* 22.1 versions earlier than 22.1R3-S2;
* 22.2 versions earlier than 22.2R3-S2;
* 22.3 versions earlier than 22.3R2-S2, 22.3R3;
* 22.4 versions earlier than 22.4R1-S2, 22.4R2-S2, 22.4R3.
References
Link | Resource |
---|---|
https://supportportal.juniper.net/JSA75748 | Vendor Advisory |
https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N | Third Party Advisory |
https://supportportal.juniper.net/JSA75748 | Vendor Advisory |
https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportportal.juniper.net/JSA75748 - Vendor Advisory | |
References | () https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N - Third Party Advisory |
18 Jan 2024, 20:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-12 01:15
Updated : 2024-11-21 08:54
NVD link : CVE-2024-21607
Mitre link : CVE-2024-21607
CVE.ORG link : CVE-2024-21607
JSON object : View
Products Affected
juniper
- mx10
- mx2020
- mx480
- junos
- ex9208
- mx2008
- mx5
- mx104
- mx80
- mx10004
- mx240
- mx10003
- mx40
- mx204
- ex9204
- mx10008
- mx2010
- mx10016
- mx10000
- mx960
- mx150
- ex9200
- mx304
CWE