Vulnerability Database

289,784

Total vulnerabilities in the database

CVE-2024-21604

An Allocation of Resources Without Limits or Throttling vulnerability in the kernel of Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).

If a high rate of specific valid packets are processed by the routing engine (RE) this will lead to a loss of connectivity of the RE with other components of the chassis and thereby a complete and persistent system outage. Please note that a carefully designed lo0 firewall filter will block or limit these packets which should prevent this issue from occurring.

The following log messages can be seen when this issue occurs:

<host> kernel: nf_conntrack: nf_conntrack: table full, dropping packet This issue affects Juniper Networks Junos OS Evolved:

  • All versions earlier than 20.4R3-S7-EVO;
  • 21.2R1-EVO and later versions;
  • 21.4-EVO versions earlier than 21.4R3-S5-EVO;
  • 22.1-EVO versions earlier than 22.1R3-S2-EVO;
  • 22.2-EVO versions earlier than 22.2R3-EVO;
  • 22.3-EVO versions earlier than 22.3R2-EVO;
  • 22.4-EVO versions earlier than 22.4R2-EVO.
  • Published: Jan 12, 2024
  • Updated: Jan 20, 2024
  • CVE: CVE-2024-21604
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.5
  • AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CWEs:

Software From Fixed in
juniper / junos_os_evolved 21.2-r1-s1 21.2-r1-s1.x
juniper / junos_os_evolved 21.2-r2 21.2-r2.x
juniper / junos_os_evolved 21.2-r1-s2 21.2-r1-s2.x
juniper / junos_os_evolved 21.2-r2-s1 21.2-r2-s1.x
juniper / junos_os_evolved 21.2-r2-s2 21.2-r2-s2.x
juniper / junos_os_evolved 21.2-r3 21.2-r3.x
juniper / junos_os_evolved 21.2-r3-s1 21.2-r3-s1.x
juniper / junos_os_evolved 21.2-r3-s2 21.2-r3-s2.x
juniper / junos_os_evolved 21.2-r3-s3 21.2-r3-s3.x
juniper / junos_os_evolved 21.2-r3-s4 21.2-r3-s4.x
juniper / junos_os_evolved 21.2-r3-s5 21.2-r3-s5.x
juniper / junos_os_evolved 21.2-r3-s6 21.2-r3-s6.x
juniper / junos_os_evolved 21.4-r1 21.4-r1.x
juniper / junos_os_evolved 21.4-r1-s1 21.4-r1-s1.x
juniper / junos_os_evolved 21.4 21.4.x
juniper / junos_os_evolved 21.4-r2 21.4-r2.x
juniper / junos_os_evolved 21.4-r2-s1 21.4-r2-s1.x
juniper / junos_os_evolved 21.4-r2-s2 21.4-r2-s2.x
juniper / junos_os_evolved 21.4-r1-s2 21.4-r1-s2.x
juniper / junos_os_evolved 21.4-r3 21.4-r3.x
juniper / junos_os_evolved 21.4-r3-s1 21.4-r3-s1.x
juniper / junos_os_evolved 21.4-r3-s2 21.4-r3-s2.x
juniper / junos_os_evolved 21.4-r3-s3 21.4-r3-s3.x
juniper / junos_os_evolved 21.4-r3-s4 21.4-r3-s4.x
juniper / junos_os_evolved 22.1-r1 22.1-r1.x
juniper / junos_os_evolved 22.1-r1-s1 22.1-r1-s1.x
juniper / junos_os_evolved 22.1-r1-s2 22.1-r1-s2.x
juniper / junos_os_evolved 22.1-r2 22.1-r2.x
juniper / junos_os_evolved 22.1-r2-s1 22.1-r2-s1.x
juniper / junos_os_evolved 22.1-r3 22.1-r3.x
juniper / junos_os_evolved 22.1-r3-s1 22.1-r3-s1.x
juniper / junos_os_evolved 22.1 22.1.x
juniper / junos_os_evolved 22.2-r1-s1 22.2-r1-s1.x
juniper / junos_os_evolved 22.2-r1 22.2-r1.x
juniper / junos_os_evolved 22.2-r2 22.2-r2.x
juniper / junos_os_evolved 22.2-r2-s1 22.2-r2-s1.x
juniper / junos_os_evolved 22.2-r2-s2 22.2-r2-s2.x
juniper / junos_os_evolved 22.2 22.2.x
juniper / junos_os_evolved 22.3-r1 22.3-r1.x
juniper / junos_os_evolved 22.3-r1-s1 22.3-r1-s1.x
juniper / junos_os_evolved 22.3-r1-s2 22.3-r1-s2.x
juniper / junos_os_evolved 22.3 22.3.x
juniper / junos_os_evolved 22.4-r1 22.4-r1.x
juniper / junos_os_evolved 22.4-r1-s1 22.4-r1-s1.x
juniper / junos_os_evolved 22.4-r1-s2 22.4-r1-s2.x
juniper / junos_os_evolved 22.4 22.4.x