CVE-2024-39540

7.5 HIGH

📋 TL;DR

An unauthenticated attacker can cause a denial-of-service by sending specific valid TCP traffic to affected Juniper devices, triggering a Packet Forwarding Engine crash and restart. This affects Juniper SRX Series and MX Series with SPC3 running specific Junos OS 21.2 releases. The vulnerability results in momentary but complete service outages.

💻 Affected Systems

Products:
  • Juniper SRX Series
  • Juniper MX Series with SPC3
Versions: Junos OS 21.2 releases from 21.2R3-S5 before 21.2R3-S6
Operating Systems: Junos OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific 21.2 releases; earlier and later releases are not affected. Requires PFE to be processing TCP traffic.

📦 What is this software?

Junos by Juniper

Junos OS is Juniper Networks' flagship network operating system running on enterprise routers, switches, security appliances, and data center infrastructure worldwide. Deployed across telecommunications providers, ISPs, cloud service providers, financial institutions, and large enterprises, Junos po...

Learn more about Junos →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network outage for all traffic passing through affected devices, potentially disrupting critical services until PFE restarts.

🟠

Likely Case

Intermittent service disruptions as PFE crashes and restarts when attackers send crafted TCP traffic.

🟢

If Mitigated

Minimal impact if devices are patched or workarounds are implemented to block malicious traffic.

🌐 Internet-Facing: HIGH - Unauthenticated network-based attack means internet-facing interfaces are directly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still trigger the DoS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Attack requires sending specific valid TCP traffic, no authentication needed.

Vulnerability is triggered by specific valid TCP traffic patterns. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Junos OS 21.2R3-S6 or later

Vendor Advisory: https://supportportal.juniper.net/JSA83000

Restart Required: Yes

Instructions:

1. Download Junos OS 21.2R3-S6 or later from Juniper support portal. 2. Upload to device. 3. Install using 'request system software add' command. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

TCP Traffic Filtering

all

Implement firewall rules or ACLs to block suspicious TCP traffic patterns that might trigger the vulnerability.

set security policies from-zone untrust to-zone trust policy block-tcp match source-address any
set security policies from-zone untrust to-zone trust policy block-tcp match destination-address any
set security policies from-zone untrust to-zone trust policy block-tcp match application junos-tcp
set security policies from-zone untrust to-zone trust policy block-tcp then deny

🧯 If You Can't Patch

  • Implement strict network segmentation to limit exposure to untrusted networks.
  • Deploy intrusion prevention systems to detect and block malicious TCP traffic patterns.

🔍 How to Verify

Check if Vulnerable:

Check Junos OS version with 'show version' command. If version is 21.2R3-S5 or between 21.2R3-S5 and 21.2R3-S6, device is vulnerable.

Check Version:

show version | match Junos

Verify Fix Applied:

After patching, verify version is 21.2R3-S6 or later using 'show version' command and monitor PFE stability.

📡 Detection & Monitoring

Log Indicators:

  • PFE crash messages in system logs
  • Unexpected PFE restarts
  • High CPU/memory usage before crash

Network Indicators:

  • Unusual TCP traffic patterns to device interfaces
  • Increased TCP retransmissions or resets

SIEM Query:

source="juniper-firewall" AND ("PFE crash" OR "Packet Forwarding Engine restart")

🔗 References

📤 Share & Export