Loading HuntDB...

GHSA-55g7-m9v7-8rhg

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

An Improper Handling of Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows a network-based, unauthenticated attacker to cause a Denial-of-Service (DoS).

If a value is configured for DDoS bandwidth or burst parameters for any protocol in
a queue, all protocols which share the same queue will have
their bandwidth or burst value changed to the new value. If, for example, OSPF was configured with a certain bandwidth value, ISIS would also be limited to this value. So inadvertently either the control plane is open for a high level of specific traffic which was supposed to be limited to a lower value, or the limit for a certain protocol is so low that chances to succeed with a volumetric DoS attack are significantly increased. 

This issue affects Junos OS Evolved on ACX 7000 Series:

* All versions before 21.4R3-S7-EVO,
* 22.1 versions before 22.1R3-S6-EVO, 
* 22.2 versions before 22.2R3-S3-EVO,
* 22.3 versions before 22.3R3-S3-EVO, 
* 22.4 versions before 22.4R3-S2-EVO,
* 23.2 versions before 23.2R2-EVO,
* 23.4

versions

before 23.4R1-S1-EVO, 23.4R2-EVO.

Related CVEs

Key Information

GHSA ID
GHSA-55g7-m9v7-8rhg
Published
July 11, 2024 6:31 PM
Last Modified
July 11, 2024 6:31 PM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.