Home

Description

An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions ip-source-address ip-destination-address arp-type which are not supported for this type of filter, are used in an ethernet switching filter, and then this filter is applied as an output filter, the configuration can be committed but the filter will not be in effect. This issue affects Junos OS on QFX5000 Series and EX4600 Series: * All version before 21.2R3-S7, * 21.4 versions before 21.4R3-S6, * 22.1 versions before 22.1R3-S5, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S2, * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2. Please note that the implemented fix ensures these unsupported match conditions cannot be committed anymore.

PUBLISHED Reserved 2024-06-25 | Published 2024-07-11 | Updated 2024-08-02 | Assigner juniper




MEDIUM: 5.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N

Problem types

CWE-447 Unimplemented or Unsupported Feature in UI

Product status

Default status
unaffected

Any version before 21.2R3-S7
affected

21.4 (semver) before 21.4R3-S6
affected

22.1 (semver) before 22.1R3-S5
affected

22.2 (semver) before 22.2R3-S3
affected

22.3 (semver) before 22.3R3-S2
affected

22.4 (semver) before 22.4R3
affected

23.2 (semver) before 23.2R2
affected

References

supportportal.juniper.net/JSA82993 vendor-advisory

supportportal.juniper.net/JSA82993 vendor-advisory

cve.org (CVE-2024-39533)

nvd.nist.gov (CVE-2024-39533)

Download JSON