An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS).
An attacker can send specific HTTPS connection requests to the device, triggering the creation of processes that are not properly terminated. Over time, this leads to resource exhaustion, ultimately causing the device to crash and restart.
The following command can be used to monitor the resource usage:
user@host> show system processes extensive | match mgd | count
This issue affects Junos OS on SRX Series and EX Series:
All versions before 21.4R3-S7,
from 22.2 before 22.2R3-S4,
from 22.3 before 22.3R3-S3,
from 22.4 before 22.4R3-S2,
from 23.2 before 23.2R2-S1,
from 23.4 before 23.4R1-S2, 23.4R2.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://supportportal.juniper.net/ |
|
History
Mon, 26 Jan 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper ex2300
Juniper ex2300-c Juniper ex3400 Juniper ex4000 Juniper ex4100 Juniper ex4100-f Juniper ex4100-h Juniper ex4300 Juniper ex4400 Juniper ex4600 Juniper ex4650 Juniper ex9204 Juniper ex9208 Juniper ex9214 Juniper mx10004 Juniper mx10008 Juniper mx2008 Juniper mx2010 Juniper mx2020 Juniper mx204 Juniper mx240 Juniper mx304 Juniper mx480 Juniper mx960 Juniper qfx10002 Juniper qfx10008 Juniper qfx10016 Juniper qfx5110 Juniper qfx5120 Juniper qfx5130 Juniper qfx5200 Juniper qfx5210 Juniper qfx5220 Juniper qfx5230-64cd Juniper qfx5240 Juniper qfx5241 Juniper qfx5700 Juniper srx1500 Juniper srx1600 Juniper srx2300 Juniper srx300 Juniper srx320 Juniper srx340 Juniper srx345 Juniper srx380 Juniper srx4100 Juniper srx4120 Juniper srx4200 Juniper srx4300 Juniper srx4600 Juniper srx4700 Juniper srx5400 Juniper srx5600 Juniper srx5800 |
|
| CPEs | cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4000:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4100-f:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4100-h:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10004:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx304:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10002:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10008:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx10016:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5110:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5120:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5130:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5210:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5220:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5230-64cd:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5240:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5241:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:qfx5700:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx1600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx2300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4120:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4300:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx4700:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3-s6:*:*:*:*:*:* cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3-s3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:22.4:r3:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.2:r2:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:* cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:* |
|
| Vendors & Products |
Juniper ex2300
Juniper ex2300-c Juniper ex3400 Juniper ex4000 Juniper ex4100 Juniper ex4100-f Juniper ex4100-h Juniper ex4300 Juniper ex4400 Juniper ex4600 Juniper ex4650 Juniper ex9204 Juniper ex9208 Juniper ex9214 Juniper mx10004 Juniper mx10008 Juniper mx2008 Juniper mx2010 Juniper mx2020 Juniper mx204 Juniper mx240 Juniper mx304 Juniper mx480 Juniper mx960 Juniper qfx10002 Juniper qfx10008 Juniper qfx10016 Juniper qfx5110 Juniper qfx5120 Juniper qfx5130 Juniper qfx5200 Juniper qfx5210 Juniper qfx5220 Juniper qfx5230-64cd Juniper qfx5240 Juniper qfx5241 Juniper qfx5700 Juniper srx1500 Juniper srx1600 Juniper srx2300 Juniper srx300 Juniper srx320 Juniper srx340 Juniper srx345 Juniper srx380 Juniper srx4100 Juniper srx4120 Juniper srx4200 Juniper srx4300 Juniper srx4600 Juniper srx4700 Juniper srx5400 Juniper srx5600 Juniper srx5800 |
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Juniper
Juniper junos |
|
| CPEs | cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Juniper
Juniper junos |
|
| Metrics |
ssvc
|
Fri, 11 Oct 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Uncontrolled Resource Consumption vulnerability in the http daemon (httpd) of Juniper Networks Junos OS on SRX Series, QFX Series, MX Series and EX Series allows an unauthenticated, network-based attacker to cause Denial-of-Service (DoS). An attacker can send specific HTTPS connection requests to the device, triggering the creation of processes that are not properly terminated. Over time, this leads to resource exhaustion, ultimately causing the device to crash and restart. The following command can be used to monitor the resource usage: user@host> show system processes extensive | match mgd | count This issue affects Junos OS on SRX Series and EX Series: All versions before 21.4R3-S7, from 22.2 before 22.2R3-S4, from 22.3 before 22.3R3-S3, from 22.4 before 22.4R3-S2, from 23.2 before 23.2R2-S1, from 23.4 before 23.4R1-S2, 23.4R2. | |
| Title | Junos OS: SRX Series, QFX Series, MX Series and EX Series: Receiving specific HTTPS traffic causes resource exhaustion | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: juniper
Published: 2024-10-11T15:28:49.424Z
Updated: 2024-10-11T17:41:24.159Z
Reserved: 2024-09-25T15:26:52.609Z
Link: CVE-2024-47497
Updated: 2024-10-11T17:41:11.025Z
Status : Analyzed
Published: 2024-10-11T16:15:10.340
Modified: 2026-01-26T18:17:47.580
Link: CVE-2024-47497
No data.