CVE Vulnerabilities

CVE-2024-30390

Improper Restriction of Excessive Authentication Attempts

Published: Apr 12, 2024 | Modified: Feb 06, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Networks Junos OS Evolved allows an unauthenticated, network-based attacker to cause a limited Denial of Service (DoS) to the management plane.

When an incoming connection was blocked because it exceeded the connections-per-second rate-limit, the system doesnt consider existing connections anymore for subsequent connection attempts so that the connection limit can be exceeded. This issue affects Junos OS Evolved:

  • All versions before 21.4R3-S4-EVO,
  • 22.1-EVO versions before 22.1R3-S3-EVO,
  • 22.2-EVO versions before 22.2R3-S2-EVO, 
  • 22.3-EVO versions before 22.3R2-S1-EVO, 22.3R3-EVO.

Weakness

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.

Affected Software

Name Vendor Start Version End Version
Junos_os_evolved Juniper * 21.4 (excluding)
Junos_os_evolved Juniper 21.4 (including) 21.4 (including)
Junos_os_evolved Juniper 21.4-r1 (including) 21.4-r1 (including)
Junos_os_evolved Juniper 21.4-r1-s1 (including) 21.4-r1-s1 (including)
Junos_os_evolved Juniper 21.4-r1-s2 (including) 21.4-r1-s2 (including)
Junos_os_evolved Juniper 21.4-r2 (including) 21.4-r2 (including)
Junos_os_evolved Juniper 21.4-r2-s1 (including) 21.4-r2-s1 (including)
Junos_os_evolved Juniper 21.4-r2-s2 (including) 21.4-r2-s2 (including)
Junos_os_evolved Juniper 21.4-r3 (including) 21.4-r3 (including)
Junos_os_evolved Juniper 21.4-r3-s1 (including) 21.4-r3-s1 (including)
Junos_os_evolved Juniper 21.4-r3-s2 (including) 21.4-r3-s2 (including)
Junos_os_evolved Juniper 21.4-r3-s3 (including) 21.4-r3-s3 (including)
Junos_os_evolved Juniper 22.1 (including) 22.1 (including)
Junos_os_evolved Juniper 22.1-r1 (including) 22.1-r1 (including)
Junos_os_evolved Juniper 22.1-r1-s1 (including) 22.1-r1-s1 (including)
Junos_os_evolved Juniper 22.1-r1-s2 (including) 22.1-r1-s2 (including)
Junos_os_evolved Juniper 22.1-r2 (including) 22.1-r2 (including)
Junos_os_evolved Juniper 22.1-r2-s1 (including) 22.1-r2-s1 (including)
Junos_os_evolved Juniper 22.1-r3 (including) 22.1-r3 (including)
Junos_os_evolved Juniper 22.1-r3-s1 (including) 22.1-r3-s1 (including)
Junos_os_evolved Juniper 22.1-r3-s2 (including) 22.1-r3-s2 (including)
Junos_os_evolved Juniper 22.2 (including) 22.2 (including)
Junos_os_evolved Juniper 22.2-r1 (including) 22.2-r1 (including)
Junos_os_evolved Juniper 22.2-r1-s1 (including) 22.2-r1-s1 (including)
Junos_os_evolved Juniper 22.2-r1-s2 (including) 22.2-r1-s2 (including)
Junos_os_evolved Juniper 22.2-r2 (including) 22.2-r2 (including)
Junos_os_evolved Juniper 22.2-r2-s1 (including) 22.2-r2-s1 (including)
Junos_os_evolved Juniper 22.2-r2-s2 (including) 22.2-r2-s2 (including)
Junos_os_evolved Juniper 22.2-r3 (including) 22.2-r3 (including)
Junos_os_evolved Juniper 22.2-r3-s1 (including) 22.2-r3-s1 (including)
Junos_os_evolved Juniper 22.3 (including) 22.3 (including)
Junos_os_evolved Juniper 22.3-r1 (including) 22.3-r1 (including)
Junos_os_evolved Juniper 22.3-r1-s1 (including) 22.3-r1-s1 (including)
Junos_os_evolved Juniper 22.3-r1-s2 (including) 22.3-r1-s2 (including)
Junos_os_evolved Juniper 22.3-r2 (including) 22.3-r2 (including)

Potential Mitigations

  • Common protection mechanisms include:

  • Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

  • Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]

References