cve-2024-47504
Vulnerability from cvelistv5
Published
2024-10-11 15:33
Modified
2024-10-11 17:25
Severity ?
EPSS score ?
Summary
An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos).
When a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart.
This issue affects Junos OS:
* 22.1 releases 22.1R1 and later before 22.2R3-S5,
* 22.3 releases before 22.3R3-S4,
* 22.4 releases before 22.4R3-S4,
* 23.2 releases before 23.2R2-S2,
* 23.4 releases before 23.4R2-S1,
* 24.2 releases before 24.2R1-S1, 24.2R2.
Please note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 22.2 ≤ Version: 22.3 ≤ Version: 22.4 ≤ Version: 23.2 ≤ Version: 23.4 ≤ Version: 24.2 ≤ |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "junos", vendor: "juniper", versions: [ { lessThan: "22.2r3-s5", status: "affected", version: "22.2", versionType: "semver", }, { lessThan: "22.3r3-s4", status: "affected", version: "22.3", versionType: "semver", }, { lessThan: "22.4r3-s4", status: "affected", version: "22.4", versionType: "semver", }, { lessThan: "23.2r2-s2", status: "affected", version: "23.2", versionType: "semver", }, { lessThan: "23.4r2-s1", status: "affected", version: "23.4", versionType: "semver", }, { lessThan: "24.2r1-s1", status: "affected", version: "24.2", versionType: "semver", }, { lessThan: "24.2r2", status: "affected", version: "24.2", versionType: "semver", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-47504", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-11T17:19:09.401803Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-11T17:25:02.384Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "SRX5000 Series", ], product: "Junos OS", vendor: "Juniper Networks", versions: [ { lessThan: "22.2R3-S5", status: "affected", version: "22.2", versionType: "semver", }, { lessThan: "22.3R3-S4", status: "affected", version: "22.3", versionType: "semver", }, { lessThan: "22.4R3-S4", status: "affected", version: "22.4", versionType: "semver", }, { lessThan: "23.2R2-S2", status: "affected", version: "23.2", versionType: "semver", }, { lessThan: "23.4R2-S1", status: "affected", version: "23.4", versionType: "semver", }, { lessThan: "24.2R1-S1, 24.2R2", status: "affected", version: "24.2", versionType: "semver", }, ], }, ], configurations: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "To be exposed to this issue the device must not be configured for clustering:<br><br><tt>user@host> show chassis cluster status <br>error: Chassis cluster is not enabled.</tt>", }, ], value: "To be exposed to this issue the device must not be configured for clustering:\n\nuser@host> show chassis cluster status \nerror: Chassis cluster is not enabled.", }, ], datePublic: "2024-10-09T16:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos).<br><br>When a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart.<br><br><span style=\"background-color: var(--wht);\">This issue affects Junos OS:</span><p></p><ul><li>22.1 releases 22.1R1 and later before 22.2R3-S5,</li><li>22.3 releases before 22.3R3-S4,</li><li>22.4 releases before 22.4R3-S4,</li><li>23.2 releases before 23.2R2-S2,</li><li>23.4 releases before 23.4R2-S1,</li><li>24.2 releases before 24.2R1-S1, 24.2R2.</li></ul>Please note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this. <p></p>", }, ], value: "An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos).\n\nWhen a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart.\n\nThis issue affects Junos OS:\n\n * 22.1 releases 22.1R1 and later before 22.2R3-S5,\n * 22.3 releases before 22.3R3-S4,\n * 22.4 releases before 22.4R3-S4,\n * 23.2 releases before 23.2R2-S2,\n * 23.4 releases before 23.4R2-S1,\n * 24.2 releases before 24.2R1-S1, 24.2R2.\n\n\nPlease note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this.", }, ], exploits: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], value: "Juniper SIRT is not aware of any malicious exploitation of this vulnerability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, { cvssV4_0: { Automatable: "YES", Recovery: "AUTOMATIC", Safety: "NOT_DEFINED", attackComplexity: "LOW", attackRequirements: "NONE", attackVector: "NETWORK", baseScore: 8.7, baseSeverity: "HIGH", privilegesRequired: "NONE", providerUrgency: "NOT_DEFINED", subAvailabilityImpact: "LOW", subConfidentialityImpact: "NONE", subIntegrityImpact: "NONE", userInteraction: "NONE", valueDensity: "NOT_DEFINED", vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M", version: "4.0", vulnAvailabilityImpact: "HIGH", vulnConfidentialityImpact: "NONE", vulnIntegrityImpact: "NONE", vulnerabilityResponseEffort: "MODERATE", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-1287", description: "CWE-1287 Improper Validation of Specified Type of Input", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-11T15:34:31.872Z", orgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", shortName: "juniper", }, references: [ { tags: [ "vendor-advisory", ], url: "https://supportportal.juniper.net/JSA88134", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "The following software releases have been updated to resolve this specific issue: 22.2R3-S5*, 22.3R3-S4*, 22.4R3-S4, 23.2R2-S2, 23.4R2-S1, 24.2R1-S1, 24.2R2*, 24.4R1*, and all subsequent releases.<br>\n\n(* future release)", }, ], value: "The following software releases have been updated to resolve this specific issue: 22.2R3-S5*, 22.3R3-S4*, 22.4R3-S4, 23.2R2-S2, 23.4R2-S1, 24.2R1-S1, 24.2R2*, 24.4R1*, and all subsequent releases.\n\n\n(* future release)", }, ], source: { advisory: "JSA88134", defect: [ "1821452", ], discovery: "USER", }, title: "Junos OS: SRX5000 Series: Receipt of a specific malformed packet will cause a flowd crash", workarounds: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "There are no known workarounds for this issue.", }, ], value: "There are no known workarounds for this issue.", }, ], x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "8cbe9d5a-a066-4c94-8978-4b15efeae968", assignerShortName: "juniper", cveId: "CVE-2024-47504", datePublished: "2024-10-11T15:33:08.341Z", dateReserved: "2024-09-25T15:26:52.610Z", dateUpdated: "2024-10-11T17:25:02.384Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-47504\",\"sourceIdentifier\":\"sirt@juniper.net\",\"published\":\"2024-10-11T16:15:11.900\",\"lastModified\":\"2024-10-15T12:58:51.050\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos).\\n\\nWhen a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart.\\n\\nThis issue affects Junos OS:\\n\\n * 22.1 releases 22.1R1 and later before 22.2R3-S5,\\n * 22.3 releases before 22.3R3-S4,\\n * 22.4 releases before 22.4R3-S4,\\n * 23.2 releases before 23.2R2-S2,\\n * 23.4 releases before 23.4R2-S1,\\n * 24.2 releases before 24.2R1-S1, 24.2R2.\\n\\n\\nPlease note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de validación incorrecta del tipo de entrada especificado en el motor de reenvío de paquetes (pfe) de Juniper Networks Junos OS en la serie SRX5000 permite que un atacante no autenticado basado en la red provoque una denegación de servicio (Dos). Cuando un dispositivo SRX5000 no agrupado recibe un paquete específicamente malformado, esto provocará un bloqueo y reinicio de flowd. Este problema afecta a Junos OS: * 22.1 versiones 22.1R1 y posteriores anteriores a 22.2R3-S5, * 22.3 versiones anteriores a 22.3R3-S4, * 22.4 versiones anteriores a 22.4R3-S4, * 23.2 versiones anteriores a 23.2R2-S2, * 23.4 versiones anteriores a 23.4R2-S1, * 24.2 versiones anteriores a 24.2R1-S1, 24.2R2. Tenga en cuenta que el comunicado de prensa indica que también se han corregido versiones anteriores, pero que estas no se verán afectadas negativamente por esto.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"NONE\",\"vulnerableSystemAvailability\":\"HIGH\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"LOW\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"YES\",\"recovery\":\"AUTOMATIC\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"sirt@juniper.net\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1287\"}]}],\"references\":[{\"url\":\"https://supportportal.juniper.net/JSA88134\",\"source\":\"sirt@juniper.net\"}]}}", vulnrichment: { containers: "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"platforms\": [\"SRX5000 Series\"], \"product\": \"Junos OS\", \"vendor\": \"Juniper Networks\", \"versions\": [{\"lessThan\": \"22.2R3-S5\", \"status\": \"affected\", \"version\": \"22.2\", \"versionType\": \"semver\"}, {\"lessThan\": \"22.3R3-S4\", \"status\": \"affected\", \"version\": \"22.3\", \"versionType\": \"semver\"}, {\"lessThan\": \"22.4R3-S4\", \"status\": \"affected\", \"version\": \"22.4\", \"versionType\": \"semver\"}, {\"lessThan\": \"23.2R2-S2\", \"status\": \"affected\", \"version\": \"23.2\", \"versionType\": \"semver\"}, {\"lessThan\": \"23.4R2-S1\", \"status\": \"affected\", \"version\": \"23.4\", \"versionType\": \"semver\"}, {\"lessThan\": \"24.2R1-S1, 24.2R2\", \"status\": \"affected\", \"version\": \"24.2\", \"versionType\": \"semver\"}]}], \"configurations\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"To be exposed to this issue the device must not be configured for clustering:<br><br><tt>user@host> show chassis cluster status <br>error: Chassis cluster is not enabled.</tt>\"}], \"value\": \"To be exposed to this issue the device must not be configured for clustering:\\n\\nuser@host> show chassis cluster status \\u00a0 \\u00a0 \\u00a0 \\nerror: Chassis cluster is not enabled.\"}], \"datePublic\": \"2024-10-09T16:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos).<br><br>When a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart.<br><br><span style=\\\"background-color: var(--wht);\\\">This issue affects Junos OS:</span><p></p><ul><li>22.1 releases 22.1R1 and later before 22.2R3-S5,</li><li>22.3 releases before 22.3R3-S4,</li><li>22.4 releases before 22.4R3-S4,</li><li>23.2 releases before 23.2R2-S2,</li><li>23.4 releases before 23.4R2-S1,</li><li>24.2 releases before 24.2R1-S1, 24.2R2.</li></ul>Please note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this. <p></p>\"}], \"value\": \"An Improper Validation of Specified Type of Input vulnerability in the packet forwarding engine (pfe) Juniper Networks Junos OS on SRX5000 Series allows an unauthenticated, network based attacker to cause a Denial of Service (Dos).\\n\\nWhen a non-clustered SRX5000 device receives a specifically malformed packet this will cause a flowd crash and restart.\\n\\nThis issue affects Junos OS:\\n\\n * 22.1 releases 22.1R1 and later before 22.2R3-S5,\\n * 22.3 releases before 22.3R3-S4,\\n * 22.4 releases before 22.4R3-S4,\\n * 23.2 releases before 23.2R2-S2,\\n * 23.4 releases before 23.4R2-S1,\\n * 24.2 releases before 24.2R1-S1, 24.2R2.\\n\\n\\nPlease note that the PR does indicate that earlier versions have been fixed as well, but these won't be adversely impacted by this.\"}], \"exploits\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\"}], \"value\": \"Juniper SIRT is not aware of any malicious exploitation of this vulnerability.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"cvssV4_0\": {\"Automatable\": \"YES\", \"Recovery\": \"AUTOMATIC\", \"Safety\": \"NOT_DEFINED\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"attackVector\": \"NETWORK\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"providerUrgency\": \"NOT_DEFINED\", \"subAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:Y/R:A/RE:M\", \"version\": \"4.0\", \"vulnAvailabilityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-1287\", \"description\": \"CWE-1287 Improper Validation of Specified Type of Input\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"shortName\": \"juniper\", \"dateUpdated\": \"2024-10-11T15:34:31.872Z\"}, \"references\": [{\"tags\": [\"vendor-advisory\"], \"url\": \"https://supportportal.juniper.net/JSA88134\"}], \"solutions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"The following software releases have been updated to resolve this specific issue: 22.2R3-S5*, 22.3R3-S4*, 22.4R3-S4, 23.2R2-S2, 23.4R2-S1, 24.2R1-S1, 24.2R2*, 24.4R1*, and all subsequent releases.<br>\\n\\n(* future release)\"}], \"value\": \"The following software releases have been updated to resolve this specific issue: 22.2R3-S5*,\\u00a022.3R3-S4*, 22.4R3-S4, 23.2R2-S2, 23.4R2-S1, 24.2R1-S1, 24.2R2*, 24.4R1*, and all subsequent releases.\\n\\n\\n(* future release)\"}], \"source\": {\"advisory\": \"JSA88134\", \"defect\": [\"1821452\"], \"discovery\": \"USER\"}, \"title\": \"Junos OS: SRX5000 Series: Receipt of a specific malformed packet will cause a flowd crash\", \"workarounds\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"There are no known workarounds for this issue.\"}], \"value\": \"There are no known workarounds for this issue.\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47504\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-11T17:19:09.401803Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*\"], \"vendor\": \"juniper\", \"product\": \"junos\", \"versions\": [{\"status\": \"affected\", \"version\": \"22.2\", \"lessThan\": \"22.2r3-s5\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.3\", \"lessThan\": \"22.3r3-s4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"22.4\", \"lessThan\": \"22.4r3-s4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.2\", \"lessThan\": \"23.2r2-s2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.4\", \"lessThan\": \"23.4r2-s1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.2\", \"lessThan\": \"24.2r1-s1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.2\", \"lessThan\": \"24.2r2\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-11T17:24:42.969Z\"}}]}", cveMetadata: "{\"cveId\": \"CVE-2024-47504\", \"assignerOrgId\": \"8cbe9d5a-a066-4c94-8978-4b15efeae968\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"juniper\", \"dateReserved\": \"2024-09-25T15:26:52.610Z\", \"datePublished\": \"2024-10-11T15:33:08.341Z\", \"dateUpdated\": \"2024-10-11T17:25:02.384Z\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.