| Summary | An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos OS and Junos OS Evolved allows a network-based attacker with low privileges to cause a complete Denial-of-Service (DoS) of the management plane. When NETCONF sessions are quickly established and disconnected, a locking issue causes mgd processes to hang in an unusable state. When the maximum number of mgd processes has been reached, no new logins are possible. This leads to the inability to manage the device and requires a power-cycle to recover. This issue can be monitored by checking for mgd processes in lockf state in the output of 'show system processes extensive': user@host> show system processes extensive | match mgd If the system still can be accessed (either via the CLI or as root, which might still be possible as last resort as this won't invoke mgd), mgd processes in this state can be killed with 'request system process terminate <PID>' from the CLI or with 'kill -9 <PID>' from the shell. This issue affects: Junos OS: * 23.4 versions before 23.4R2-S4, This issue does not affect Junos OS versions before 23.4R1; Junos OS Evolved: * 23.4 versions before 23.4R2-S5-EVO, This issue does not affect Junos OS Evolved versions before 23.4R1-EVO; |
|---|---|
| Publication Date | April 10, 2026, 7:16 a.m. |
| Registration Date | April 15, 2026, 11:35 a.m. |
| Last Update | April 18, 2026, 3:04 a.m. |
| CVSS3.1 : MEDIUM | |
| スコア | 6.5 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 低 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:juniper:junos:23.4:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:23.4:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:23.4:r1-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:23.4:r1-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:23.4:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:23.4:r2-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:23.4:r2-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:23.4:r2-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.2:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.2:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.2:r1-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.2:r1-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.2:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.4:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.4:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.4:r1-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos:24.4:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r1-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s3:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:23.4:r2-s4:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.2:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.2:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.2:r1-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.2:r2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.4:-:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.4:r1:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.4:r1-s2:*:*:*:*:*:* | |||||
| cpe:2.3:o:juniper:junos_os_evolved:24.4:r2:*:*:*:*:*:* | |||||