{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T15:40:01.378","vulnerabilities":[{"cve":{"id":"CVE-2024-39535","sourceIdentifier":"sirt@juniper.net","published":"2024-07-11T17:15:10.900","lastModified":"2026-01-22T21:13:07.270","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX 7000 Series allows an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS).\n\nWhen a device has a Layer 3 or an IRB interface configured in a VPLS instance and specific traffic is received, the evo-pfemand processes crashes which causes a service outage for the respective FPC until the system is recovered manually.\n\nThis issue only affects Junos OS Evolved 22.4R2-S1 and 22.4R2-S2 releases and is fixed in 22.4R3. No other releases are affected."},{"lang":"es","value":"Una verificación inadecuada de la vulnerabilidad de condiciones inusuales o excepcionales en Packet Forwarding Engine (PFE) de Juniper Networks Junos OS Evolved en la serie ACX 7000 permite que un atacante adyacente no autenticado provoque una denegación de servicio (DoS). Cuando un dispositivo tiene una interfaz de Capa 3 o IRB configurada en una instancia de VPLS y se recibe tráfico específico, los procesos evo-pfemand fallan, lo que provoca una interrupción del servicio para el FPC respectivo hasta que el sistema se recupere manualmente. Este problema solo afecta a las versiones Junos OS Evolved 22.4R2-S1 y 22.4R2-S2 y se solucionó en 22.4R3. Ninguna otra versión se ve afectada."}],"metrics":{"cvssMetricV40":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"ADJACENT","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"LOW","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"sirt@juniper.net","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"sirt@juniper.net","type":"Secondary","description":[{"lang":"en","value":"CWE-754"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*","matchCriteriaId":"8AE9D1A7-4721-4E1D-B965-FDC38126B1DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*","matchCriteriaId":"A8643AA3-29EF-48A7-B033-CB60988E214B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:acx7020:-:*:*:*:*:*:*:*","matchCriteriaId":"B2E5B843-629D-43D7-A4EE-EFA658109B25"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:acx7024:-:*:*:*:*:*:*:*","matchCriteriaId":"1026737F-BA23-4550-9030-EA0502E97953"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:acx7024x:-:*:*:*:*:*:*:*","matchCriteriaId":"2FFFD74C-7BF9-4EAF-B364-356A8393712D"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:acx7100:-:*:*:*:*:*:*:*","matchCriteriaId":"CFED6AC1-B3C0-44EC-AF40-E61CF1EE94E0"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:acx7300:-:*:*:*:*:*:*:*","matchCriteriaId":"8977D7A0-C498-4DC2-9A2C-A58D900386F3"},{"vulnerable":false,"criteria":"cpe:2.3:h:juniper:acx7509:-:*:*:*:*:*:*:*","matchCriteriaId":"B50EC358-F551-4F2B-9DA1-61B6412AB957"}]}]}],"references":[{"url":"https://supportportal.juniper.net/JSA82995","source":"sirt@juniper.net","tags":["Vendor Advisory"]},{"url":"https://supportportal.juniper.net/JSA82995","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}