An Incorrect Behavior Order vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows an unauthenticated, network-based attacker to cause an integrity impact to networks downstream of the vulnerable device.
When an output firewall filter is applied to an interface it doesn't recognize matching packets but permits any traffic.
This issue affects Junos OS 21.4 releases from 21.4R1 earlier than 21.4R3-S6.
This issue does not affect Junos OS releases earlier than 21.4R1.
References
| Link | Resource |
|---|---|
| http://supportportal.juniper.net/JSA79185 | Vendor Advisory |
| https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N | Issue Tracking |
| http://supportportal.juniper.net/JSA79185 | Vendor Advisory |
| https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N | Issue Tracking |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-04-12 16:15
Updated : 2025-02-06 20:36
NVD link : CVE-2024-30389
Mitre link : CVE-2024-30389
CVE.ORG link : CVE-2024-30389
JSON object : View
Products Affected
juniper
- ex4300-48t-dc
- ex4300-24p
- ex4300-32f-dc
- junos
- ex4300-48p-s
- ex4300-48p
- ex4300-24p-s
- ex4300-32f-s
- ex4300-48t-afi
- ex4300-48t-s
- ex4300-24t-s
- ex4300-48mp-s
- ex4300-48t
- ex4300-32f
- ex4300-48t-dc-afi
- ex4300-24t
- ex4300-48mp
- ex4300
CWE
