Overview
The CVE-2024-21602 vulnerability resides in Juniper Networks Junos OS Evolved, specifically affecting ACX7024, ACX7100-32C, and ACX7100-48L models. This vulnerability can be exploited by an unauthenticated network-based attacker to trigger a Denial of Service (DoS) condition, making it a severe threat to the availability of affected devices and the network(s) they serve.
Vulnerability Summary
CVE ID: CVE-2024-21602
Severity: High (7.5 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Denial of Service, potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Junos OS Evolved on ACX7024 | 21.4-EVO versions earlier than 21.4R3-S6-EVO
Junos OS Evolved on ACX7100-32C | 22.1-EVO versions earlier than 22.1R3-S5-EVO
Junos OS Evolved on ACX7100-48L | 22.2-EVO versions earlier than 22.2R2-S1-EVO, 22.2R3-EVO
How the Exploit Works
An attacker can exploit this vulnerability by sending a specially crafted IPv4 UDP packet to the target device. Upon receipt and processing of this packet, a NULL Pointer Dereference error is triggered in the Routing Engine (RE), causing the packetio to crash and restart. This leads to a momentary traffic interruption. If the attacker continues to send these malicious packets, it can result in a sustained DoS condition.
Conceptual Example Code
While the exact structure of the malicious packet is not detailed in the source data, the conceptual example might look something like this:
import socket
target_ip = "192.0.2.1"
target_port = 12345
# Create UDP socket
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
# Craft malicious IPv4 UDP packet
malicious_packet = b'\x00' * 1024 # This is a hypothetical representation
# Send the packet
sock.sendto(malicious_packet, (target_ip, target_port))
This example is
purely conceptual
and is intended to illustrate the method of exploit, not provide a specific exploit code. The actual structure of the packet would be determined by the specific vulnerability in the target software.

