{"uuid": "6f9cdcd6-5ed4-4b19-b3c6-ede28504d620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-39533", "type": "seen", "source": "https://t.me/cvedetector/694", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39533 - An Unimplemented or Unsupported Feature in the UI\", \n  \"Content\": \"CVE ID : CVE-2024-39533 \nPublished : July 11, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : An Unimplemented or Unsupported Feature in the UI vulnerability in Juniper Networks Junos OS on QFX5000 Series and EX4600 Series allows an unauthenticated, network-based attacker to cause a minor integrity impact to downstream networks.If one or more of the following match conditions  \n  \nip-source-address  \nip-destination-address  \narp-type  \n  \nwhich are not supported for this type of filter, are used in an ethernet switching filter,\u00a0and then this filter is applied as an output filter, the configuration can be committed but the filter will not be in effect.  \n  \n  \n  \n  \nThis issue affects Junos OS on QFX5000 Series and EX4600 Series:  \n  \n  *  All version before 21.2R3-S7,\u00a0  \n  *  21.4 versions before 21.4R3-S6,  \n  *  22.1 versions before 22.1R3-S5,  \n  *  22.2 versions before 22.2R3-S3,  \n  *  22.3 versions before 22.3R3-S2,\u00a0  \n  *  22.4 versions before 22.4R3,  \n  *  23.2 versions before 23.2R2.  \n  \n  \n  \nPlease note that the implemented fix ensures these unsupported match conditions cannot be committed anymore. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-11T20:00:12.000000Z"}