CVE-2024-39533

5.8 MEDIUM
Published: July 11, 2024 Modified: January 22, 2026
View on NVD

Description

An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions ip-source-address ip-destination-address arp-type which are not supported for this type of filter, are used in an ethernet switching filter,Β and then this filter is applied as an output filter, the configuration can be committed but the filter will not be in effect. This issue affects Junos OS on QFX5000 Series and EX4600 Series: * All version before 21.2R3-S7,Β  * 21.4 versions before 21.4R3-S6, * 22.1 versions before 22.1R3-S5, * 22.2 versions before 22.2R3-S3, * 22.3 versions before 22.3R3-S2,Β  * 22.4 versions before 22.4R3, * 23.2 versions before 23.2R2. Please note that the implemented fix ensures these unsupported match conditions cannot be committed anymore.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://supportportal.juniper.net/JSA82993
Source: sirt@juniper.net
Vendor Advisory
https://supportportal.juniper.net/JSA82993
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

2 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.8 / 10.0
EPSS (Exploit Probability)
0.3%
54th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

juniper