6.5
CVSSv3

CVE-2024-30380

Published: 16/04/2024 Updated: 17/04/2024
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

An Improper Handling of Exceptional Conditions vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated malicious user to cause a Denial of Service (DoS), which causes the l2cpd process to crash by sending a specific TLV. The l2cpd process is responsible for layer 2 control protocols, such as STP, RSTP, MSTP, VSTP, ERP, and LLDP.  The impact of the l2cpd crash is reinitialization of STP protocols (RSTP, MSTP or VSTP), and MVRP and ERP, leading to a Denial of Service.  Continued receipt and processing of this specific TLV will create a sustained Denial of Service (DoS) condition. This issue affects: Junos OS: all versions prior to 20.4R3-S9, from 21.2 prior to 21.2R3-S7, from 21.3 prior to 21.3R3-S5, from 21.4 prior to 21.4R3-S4, from 22.1 prior to 22.1R3-S4, from 22.2 prior to 22.2R3-S2, from 22.3 prior to 22.3R2-S2, 22.3R3-S1, from 22.4 prior to 22.4R2-S2, 22.4R3, from 23.2 prior to 23.2R1-S1, 23.2R2; Junos OS Evolved: all versions prior to 21.2R3-S7, from 21.3 prior to 21.3R3-S5-EVO, from 21.4 prior to 21.4R3-S5-EVO, from 22.1 prior to 22.1R3-S4-EVO, from 22.2 prior to 22.2R3-S2-EVO, from 22.3 prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO, from 22.4 prior to 22.4R2-S2-EVO, 22.4R3-EVO, from 23.2 prior to 23.2R1-S1-EVO, 23.2R2-EVO.