| Summary | An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engine (pfe) of Juniper Networks Junos OS on specific EX and QFX Series devices allow an unauthenticated, adjacent attacker to cause a complete Denial of Service (DoS). On EX4k, and QFX5k platforms configured as service-provider edge devices, if L2PT is enabled on the UNI and VSTP is enabled on NNI in VXLAN scenarios, receiving VSTP BPDUs on UNI leads to packet buffer allocation failures, resulting in the device to not pass traffic anymore until it is manually recovered with a restart.This issue affects Junos OS: * 24.4 releases before 24.4R2, This issue does not affect Junos OS releases before 24.4R1. |
|---|---|
| Publication Date | April 10, 2026, 7:16 a.m. |
| Registration Date | April 15, 2026, 11:35 a.m. |
| Last Update | April 18, 2026, 2:53 a.m. |
| CVSS3.1 : MEDIUM | |
| スコア | 6.5 |
|---|---|
| Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | 隣接 |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.4:r1-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:25.2:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:25.2:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:25.2:r2:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |