{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S1, 21.2R3-S7, 21.2R3-S8, 21.3R3, 21.3R3-S1, 21.4R2, 21.4R3, 21.4R3-S6, 21.4R3-S7, 21.4R3-S8, 21.4R3-S9, 22.1R1, 22.1R2, 22.1R3-S5, 22.1R3-S6, 22.2R1-S2, 22.2R2, 22.2R3-S3, 22.2R3-S4, 22.2R3-S5, 22.3R1, 22.3R3-S2, 22.3R3-S3, 22.3R3-S4, 22.4R3, 22.4R3-S2, 22.4R3-S3, 22.4R3-S4, 23.2R1, 23.2R2, 23.2R2-S1, 23.2R2-S2, 23.4R1, 23.4R1-S2, 23.4R2, 23.4R2-S1, 24.1R1, 24.2R1, 24.2R1-S1 et 24.2R2","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.2R3-S8-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 21.4R3-S7-EVO, 21.4R3-S8-EVO, 21.4R3-S9-EVO, 22.1R3-S5-EVO, 22.1R3-S6-EVO, 22.2R3-EVO, 22.2R3-S3-EVO, 22.2R3-S4-EVO, 22.3R3-EVO, 22.3R3-S2-EVO, 22.3R3-S3-EVO, 22.3R3-S4-EVO, 22.4R2-EVO, 22.4R3-EVO, 22.4R3-S1-EVO, 22.4R3-S2-EVO, 22.4R3-S3-EVO, 23.2R1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.2R2-S2-EVO, 23.4R1-EVO, 23.4R1-S1-EVO, 23.4R1-S2-EVO, 23.4R2-EVO, 23.4R2-S1-EVO, 24.2R1-EVO, 24.2R1-EVO et 24.2R2-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos Space 24.1R1 sans le correctif de s\u00e9curit\u00e9 Patch V1 et V2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":"Les versions suivantes de Junos OS et Junos OS Evolved sont \u00e0 para\u00eetre : 22.2R3-S5, 22.3R3-S4, 24.2R2, 24.4R1, 22.2R3-S5-EVO, 22.3R3-S4-EVO, 24.2R2-EVO et 24.4R1-EVO","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2016-1247","url":"https://www.cve.org/CVERecord?id=CVE-2016-1247"},{"name":"CVE-2024-47501","url":"https://www.cve.org/CVERecord?id=CVE-2024-47501"},{"name":"CVE-2024-47496","url":"https://www.cve.org/CVERecord?id=CVE-2024-47496"},{"name":"CVE-2023-51385","url":"https://www.cve.org/CVERecord?id=CVE-2023-51385"},{"name":"CVE-2024-47493","url":"https://www.cve.org/CVERecord?id=CVE-2024-47493"},{"name":"CVE-2024-39515","url":"https://www.cve.org/CVERecord?id=CVE-2024-39515"},{"name":"CVE-2021-3618","url":"https://www.cve.org/CVERecord?id=CVE-2021-3618"},{"name":"CVE-2023-31124","url":"https://www.cve.org/CVERecord?id=CVE-2023-31124"},{"name":"CVE-2023-3823","url":"https://www.cve.org/CVERecord?id=CVE-2023-3823"},{"name":"CVE-2023-32067","url":"https://www.cve.org/CVERecord?id=CVE-2023-32067"},{"name":"CVE-2024-39525","url":"https://www.cve.org/CVERecord?id=CVE-2024-39525"},{"name":"CVE-2024-47498","url":"https://www.cve.org/CVERecord?id=CVE-2024-47498"},{"name":"CVE-2016-0746","url":"https://www.cve.org/CVERecord?id=CVE-2016-0746"},{"name":"CVE-2023-44487","url":"https://www.cve.org/CVERecord?id=CVE-2023-44487"},{"name":"CVE-2017-20005","url":"https://www.cve.org/CVERecord?id=CVE-2017-20005"},{"name":"CVE-2024-39544","url":"https://www.cve.org/CVERecord?id=CVE-2024-39544"},{"name":"CVE-2016-4450","url":"https://www.cve.org/CVERecord?id=CVE-2016-4450"},{"name":"CVE-2023-0568","url":"https://www.cve.org/CVERecord?id=CVE-2023-0568"},{"name":"CVE-2024-47489","url":"https://www.cve.org/CVERecord?id=CVE-2024-47489"},{"name":"CVE-2022-41741","url":"https://www.cve.org/CVERecord?id=CVE-2022-41741"},{"name":"CVE-2024-47494","url":"https://www.cve.org/CVERecord?id=CVE-2024-47494"},{"name":"CVE-2024-39534","url":"https://www.cve.org/CVERecord?id=CVE-2024-39534"},{"name":"CVE-2024-47499","url":"https://www.cve.org/CVERecord?id=CVE-2024-47499"},{"name":"CVE-2022-41742","url":"https://www.cve.org/CVERecord?id=CVE-2022-41742"},{"name":"CVE-2024-39526","url":"https://www.cve.org/CVERecord?id=CVE-2024-39526"},{"name":"CVE-2024-39547","url":"https://www.cve.org/CVERecord?id=CVE-2024-39547"},{"name":"CVE-2023-31147","url":"https://www.cve.org/CVERecord?id=CVE-2023-31147"},{"name":"CVE-2024-47495","url":"https://www.cve.org/CVERecord?id=CVE-2024-47495"},{"name":"CVE-2019-20372","url":"https://www.cve.org/CVERecord?id=CVE-2019-20372"},{"name":"CVE-2016-0747","url":"https://www.cve.org/CVERecord?id=CVE-2016-0747"},{"name":"CVE-2021-23017","url":"https://www.cve.org/CVERecord?id=CVE-2021-23017"},{"name":"CVE-2024-47490","url":"https://www.cve.org/CVERecord?id=CVE-2024-47490"},{"name":"CVE-2018-16845","url":"https://www.cve.org/CVERecord?id=CVE-2018-16845"},{"name":"CVE-2024-47491","url":"https://www.cve.org/CVERecord?id=CVE-2024-47491"},{"name":"CVE-2017-7529","url":"https://www.cve.org/CVERecord?id=CVE-2017-7529"},{"name":"CVE-2024-39527","url":"https://www.cve.org/CVERecord?id=CVE-2024-39527"},{"name":"CVE-2024-39563","url":"https://www.cve.org/CVERecord?id=CVE-2024-39563"},{"name":"CVE-2024-47502","url":"https://www.cve.org/CVERecord?id=CVE-2024-47502"},{"name":"CVE-2024-39516","url":"https://www.cve.org/CVERecord?id=CVE-2024-39516"},{"name":"CVE-2024-47503","url":"https://www.cve.org/CVERecord?id=CVE-2024-47503"},{"name":"CVE-2023-0567","url":"https://www.cve.org/CVERecord?id=CVE-2023-0567"},{"name":"CVE-2024-47506","url":"https://www.cve.org/CVERecord?id=CVE-2024-47506"},{"name":"CVE-2023-0662","url":"https://www.cve.org/CVERecord?id=CVE-2023-0662"},{"name":"CVE-2024-4741","url":"https://www.cve.org/CVERecord?id=CVE-2024-4741"},{"name":"CVE-2016-0742","url":"https://www.cve.org/CVERecord?id=CVE-2016-0742"},{"name":"CVE-2024-47504","url":"https://www.cve.org/CVERecord?id=CVE-2024-47504"},{"name":"CVE-2023-3824","url":"https://www.cve.org/CVERecord?id=CVE-2023-3824"},{"name":"CVE-2023-31130","url":"https://www.cve.org/CVERecord?id=CVE-2023-31130"},{"name":"CVE-2024-2511","url":"https://www.cve.org/CVERecord?id=CVE-2024-2511"},{"name":"CVE-2024-47507","url":"https://www.cve.org/CVERecord?id=CVE-2024-47507"},{"name":"CVE-2024-47497","url":"https://www.cve.org/CVERecord?id=CVE-2024-47497"}],"links":[],"reference":"CERTFR-2024-AVI-0866","revisions":[{"description":"Version initiale","revision_date":"2024-10-10T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks","vendor_advisories":[{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88112","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-c-ares-1-18-1"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88121","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Due-to-a-race-condition-AgentD-process-causes-a-memory-corruption-and-FPC-reset-CVE-2024-47494"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88104","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-SRX-Series-Low-privileged-user-able-to-access-sensitive-information-on-file-system-CVE-2024-39527"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88107","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-resolved-in-OpenSSL"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88105","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-Connections-to-the-network-and-broadcast-address-accepted-CVE-2024-39534"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88134","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-SRX5000-Series-Receipt-of-a-specific-malformed-packet-will-cause-a-flowd-crash-CVE-2024-47504"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88123","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-MX-Series-The-PFE-will-crash-on-running-specific-command-CVE-2024-47496"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88128","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-QFX5000-Series-Configured-MAC-learning-and-move-limits-are-not-in-effect-CVE-2024-47498"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88106","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-Low-privileged-local-user-able-to-view-NETCONF-traceoptions-files-CVE-2024-39544"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88136","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-Specific-low-privileged-CLI-commands-and-SNMP-GET-requests-can-trigger-a-resource-leak"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88110","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-Space-Remote-Command-Execution-RCE-vulnerability-in-web-application-CVE-2024-39563"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88122","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-In-a-dual-RE-scenario-a-locally-authenticated-attacker-with-shell-privileges-can-take-over-the-device-CVE-2024-47495"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88124","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-SRX-Series-QFX-Series-MX-Series-and-EX-Series-Receiving-specific-HTTPS-traffic-causes-resource-exhaustion-CVE-2024-47497"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88111","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-ACX-Series-Receipt-of-specific-transit-protocol-packets-is-incorrectly-processed-by-the-RE-CVE-2024-47489"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88108","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-cRPD-Receipt-of-crafted-TCP-traffic-can-trigger-high-CPU-utilization-CVE-2024-39547"},{"published_at":"2024-10-16","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88100","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specifically-malformed-BGP-packet-causes-RPD-crash-when-segment-routing-is-enabled-CVE-2024-39516"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88131","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-MX304-MX-with-MPC10-11-LC9600-and-EX9200-with-EX9200-15C-In-a-VPLS-or-Junos-Fusion-scenario-specific-show-commands-cause-an-FPC-crash-CVE-2024-47501"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88099","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-BGP-traceoptions-enabled-receipt-of-specially-crafted-BGP-update-causes-RPD-crash-CVE-2024-39515"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88135","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Multiple-vulnerabilities-in-OSS-component-nginx-resolved"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88102","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-BGP-nexthop-traceoptions-is-enabled-receipt-of-specially-crafted-BGP-packet-causes-RPD-crash-CVE-2024-39525"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88116","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-malformed-BGP-path-attribute-leads-to-an-RPD-crash-CVE-2024-47491"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88097","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-Space-OS-command-injection-vulnerability-in-OpenSSH-CVE-2023-51385"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88133","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-SRX4600-and-SRX5000-Series-Sequence-of-specific-PIM-packets-causes-a-flowd-crash-CVE-2024-47503"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88137","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-SRX-Series-A-large-amount-of-traffic-being-processed-by-ATP-Cloud-can-lead-to-a-PFE-crash-CVE-2024-47506"},{"published_at":"2024-10-15","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88119","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-SRX5K-SRX4600-and-MX-Series-Trio-based-FPCs-Continuous-physical-interface-flaps-causes-local-FPC-to-crash-CVE-2024-47493"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88103","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-MX-Series-with-MPC10-MPC11-LC9600-MX304-EX9200-PTX-Series-Receipt-of-malformed-DHCP-packets-causes-interfaces-to-stop-processing-packets-CVE-2024-39526"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88138","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-update-message-containing-aggregator-attribute-with-an-ASN-value-of-zero-0-is-accepted-CVE-2024-47507"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88129","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-BMP-scenario-receipt-of-a-malformed-AS-PATH-attribute-can-cause-an-RPD-core-CVE-2024-47499"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88115","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-ACX-7000-Series-Receipt-of-specific-transit-MPLS-packets-causes-resources-to-be-exhausted-CVE-2024-47490"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88120","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-J-Web-Multiple-vulnerabilities-resolved-in-PHP-software"},{"published_at":"2024-10-09","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA88132","url":"https://supportportal.juniper.net/s/article/2024-10-Security-Bulletin-Junos-OS-Evolved-TCP-session-state-is-not-always-cleared-on-the-Routing-Engine-CVE-2024-47502"}]}
