Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/JSA88105 |
|
Fri, 23 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos Os Evolved |
|
| CPEs | cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s7:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:22.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper
Juniper junos Os Evolved |
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 11 Oct 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Incorrect Comparison vulnerability in the local address verification API of Juniper Networks Junos OS Evolved allows an unauthenticated network-adjacent attacker to create sessions or send traffic to the device using the network and broadcast address of the subnet assigned to an interface. This is unintended and unexpected behavior and can allow an attacker to bypass certain compensating controls, such as stateless firewall filters. This issue affects Junos OS Evolved: * All versions before 21.4R3-S8-EVO, * 22.2-EVO before 22.2R3-S4-EVO, * 22.3-EVO before 22.3R3-S4-EVO, * 22.4-EVO before 22.4R3-S3-EVO, * 23.2-EVO before 23.2R2-S1-EVO, * 23.4-EVO before 23.4R1-S2-EVO, 23.4R2-EVO. | |
| Title | Junos OS Evolved: Connections to the network and broadcast address accepted | |
| Weaknesses | CWE-697 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: juniper
Published:
Updated: 2024-10-11T19:00:54.386Z
Reserved: 2024-06-25T15:12:53.241Z
Link: CVE-2024-39534
Updated: 2024-10-11T19:00:50.386Z
Status : Analyzed
Published: 2024-10-11T16:15:06.970
Modified: 2026-01-23T18:53:16.403
Link: CVE-2024-39534
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:15:42Z