vulnerability
Juniper Junos OS: 2024-04 Security Bulletin: Junos OS and Junos OS Evolved: Higher CPU consumption on routing engine leads to Denial of Service (DoS) (JSA79099) (CVE-2024-30409)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 04/10/2024 | 04/11/2024 | 01/28/2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
04/10/2024
Added
04/11/2024
Modified
01/28/2025
Description
An Improper Check for Unusual or Exceptional Conditions vulnerability in telemetry processing of Juniper Networks Junos OS and Junos OS Evolved allows a network-based authenticated attacker to cause the forwarding information base telemetry daemon (fibtd) to crash, leading to a limited Denial of Service.
This issue affects Juniper Networks
Junos OS:
* from 22.1 before 22.1R1-S2, 22.1R2.
Junos OS Evolved:
* from 22.1 before 22.1R1-S2-EVO, 22.1R2-EVO.
Solution
juniper-junos-os-upgrade-latest

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.