An Incorrect Initialization of Resource vulnerability in the Internal Device Manager (IDM) of Juniper Networks Junos OS on EX4000 models allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).
On EX4000 models with 48 ports (EX4000-48T, EX4000-48P, EX4000-48MP) a high volume of traffic destined to the device will cause an FXPC crash and restart, which leads to a complete service outage until the device has automatically restarted.
The following reboot reason can be seen in the output of 'show chassis routing-engine' and as a log message:
reason=0x4000002 reason_string=0x4000002:watchdog + panic with core dump
This issue affects Junos OS on EX4000-48T, EX4000-48P and EX4000-48MP:
This issue does not affect versions before 24.4R1 as the first Junos OS version for the EX4000 models was 24.4R1.
| Software | From | Fixed in |
|---|---|---|
| juniper / junos | 24.4 | 24.4.x |
| juniper / junos | 24.4-r1 | 24.4-r1.x |
| juniper / junos | 24.4-r1-s2 | 24.4-r1-s2.x |
| juniper / junos | 24.4-r1-s3 | 24.4-r1-s3.x |
| juniper / junos | 25.2 | 25.2.x |
| juniper / junos | 25.2-r1 | 25.2-r1.x |
| juniper / junos | 25.2-r1-s1 | 25.2-r1-s1.x |
| juniper / junos | 25.2-r2 | 25.2-r2.x |