Vulnerability Details : CVE-2024-30387
A Missing Synchronization vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on ACX5448 and ACX710 allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).
If an interface flaps while the system gathers statistics on that interface, two processes simultaneously access a shared resource which leads to a PFE crash and restart.
This issue affects Junos OS:
* All versions before 20.4R3-S9,
* 21.2 versions before 21.2R3-S5,
* 21.3 versions before 21.3R3-S5,
* 21.4 versions before 21.4R3-S4,
* 22.1 versions before 22.1R3-S2,
* 22.2 versions before 22.2R3-S2,
* 22.3 versions before 22.3R2-S2, 22.3R3,
* 22.4 versions before 22.4R2.
Vulnerability category: Denial of service
Products affected by CVE-2024-30387
- cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*
- cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-30387
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-30387
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
Juniper Networks, Inc. | 2024-04-12 |
7.1
|
HIGH | CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/V... |
N/A
|
N/A
|
Juniper Networks, Inc. | 2025-02-06 |
CWE ids for CVE-2024-30387
-
The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.Assigned by: nvd@nist.gov (Primary)
-
The product utilizes a shared resource in a concurrent manner but does not attempt to synchronize access to the resource.Assigned by: sirt@juniper.net (Secondary)
References for CVE-2024-30387
-
https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Common Vulnerability Scoring System Version 4.0 Calculator
-
https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
Common Vulnerability Scoring System Version 4.0 CalculatorIssue Tracking
-
http://supportportal.juniper.net/JSA79187
Article DetailVendor Advisory
Jump to