Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-47508", "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "state": "PUBLISHED", "assignerShortName": "juniper", "dateReserved": "2024-09-25T15:26:52.610Z", "datePublished": "2024-10-11T15:35:58.736Z", "dateUpdated": "2024-10-11T17:18:06.811Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Junos OS Evolved", "vendor": "Juniper Networks", "versions": [{"lessThan": "21.2R3-S8-EVO", "status": "affected", "version": "21.2", "versionType": "semver"}, {"lessThan": "21.3R3-EVO", "status": "affected", "version": "21.3", "versionType": "semver"}, {"lessThan": "21.4R2-EVO,", "status": "affected", "version": "21.4", "versionType": "semver"}, {"lessThan": "22.1R1-S1-EVO, 22.1R2-EVO", "status": "affected", "version": "22.1", "versionType": "semver"}]}], "configurations": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "For this issue to be exploitable from the CLI there is no minimal configuration required. For this issue to be exploited via SNMP minimal SNMP configuration <span style=\"background-color: rgb(251, 251, 251);\">with at least read access is required:</span><br><br><tt>[ snmp community <name> ]</tt><br><br><span style=\"background-color: rgb(251, 251, 251);\">or</span><br><br><tt>[ snmp v3 ... ]</tt>\n\n<br>"}], "value": "For this issue to be exploitable from the CLI there is no minimal configuration required. For this issue to be exploited via SNMP minimal SNMP configuration with at least read access is required:\n\n[ snmp community <name> ]\n\nor\n\n[ snmp v3 ... ]"}], "datePublic": "2024-10-09T16:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "An Allocation of Resources Without Limits or Throttling <span style=\"background-color: var(--wht);\">vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS).</span><p><span style=\"background-color: var(--wht);\">When specific SNMP GET operations or specific low-priviledged CLI commands are executed, a GUID resource leak will occur, eventually leading to exhaustion and resulting in FPCs to hang. Affected FPCs need to be manually restarted to recover.</span></p><p><span style=\"background-color: var(--wht);\">GUID exhaustion will trigger a syslog message like one of the following:</span></p><code>evo-pfemand[<pid>]: get_next_guid: Ran out of Guid Space ...</code><br><code>evo-aftmand-zx[<pid>]: get_next_guid: Ran out of Guid Space ...</code><p><br>The leak can be monitored by running the following command and taking note of the values in the rightmost column labeled Guids:</p>\n\n\n\n<tt><span style=\"background-color: rgb(251, 251, 251);\">user@host> show platform application-info allocations app evo-pfemand/evo-pfemand<br></span></tt>\n\n<br>In case one or more of these values are constantly increasing the leak is happening.<br><br><p>This issue affects Junos OS Evolved:</p><p></p><ul><li>All versions before 21.2R3-S8-EVO,</li><li>21.3 versions before 21.3R3-EVO;</li><li><span style=\"background-color: var(--wht);\">21.4 versions before 22.1R2-EVO,</span><br></li><li><span style=\"background-color: var(--wht);\">22.1 versions before 22.1R1-S1-EVO, 22.1R2-EVO.</span></li></ul><br>\n\nPlease note that this issue is similar to, but different from CVE-2024-47505 and CVE-2024-47509.\n\n<br><p></p>"}], "value": "An Allocation of Resources Without Limits or Throttling\u00a0vulnerability in the PFE management daemon (evo-pfemand) of Juniper Networks Junos OS Evolved allows an authenticated, network-based attacker to cause an FPC crash leading to a Denial of Service (DoS).When specific SNMP GET operations or specific low-priviledged CLI commands are executed, a GUID resource leak will occur, eventually leading to exhaustion and resulting in FPCs to hang. Affected FPCs need to be manually restarted to recover.\n\nGUID exhaustion will trigger a syslog message like one of the following:\n\nevo-pfemand[<pid>]: get_next_guid: Ran out of Guid Space ...\nevo-aftmand-zx[<pid>]: get_next_guid: Ran out of Guid Space ...\nThe leak can be monitored by running the following command and taking note of the values in the rightmost column labeled Guids:\n\n\n\n\n\nuser@host> show platform application-info allocations app evo-pfemand/evo-pfemand\n\n\n\nIn case one or more of these values are constantly increasing the leak is happening.\n\nThis issue affects Junos OS Evolved:\n\n\n\n * All versions before 21.2R3-S8-EVO,\n * 21.3 versions before 21.3R3-EVO;\n * 21.4 versions before 22.1R2-EVO,\n\n * 22.1 versions before\u00a022.1R1-S1-EVO, 22.1R2-EVO.\n\n\n\n\n\nPlease note that this issue is similar to, but different from CVE-2024-47505 and CVE-2024-47509."}], "exploits": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}], "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}, {"cvssV4_0": {"Automatable": "YES", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 7.1, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/RE:M", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper", "dateUpdated": "2024-10-11T15:35:58.736Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://supportportal.juniper.net/"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "The following software releases have been updated to resolve this specific issue: 21.2R3-S8-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R1-S1-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases."}], "value": "The following software releases have been updated to resolve this specific issue: 21.2R3-S8-EVO, 21.3R3-EVO, 21.4R2-EVO, 22.1R1-S1-EVO, 22.1R2-EVO, 22.2R1-EVO, and all subsequent releases."}], "source": {"advisory": "JSA88136", "defect": ["1661578"], "discovery": "INTERNAL"}, "title": "Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak #2", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "There are no known workarounds for this issue.<br>\n\n<span style=\"background-color: rgb(251, 251, 251);\">To reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted networks, hosts and users.</span>\n\n<br>"}], "value": "There are no known workarounds for this issue.\n\n\nTo reduce the risk of exploitation of this issue, use access lists or firewall filters to limit access to only trusted networks, hosts and users."}], "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-11T17:17:56.510770Z", "id": "CVE-2024-47508", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-11T17:18:06.811Z"}}]}}